US20060100912A1 - Real-time insurance policy underwriting and risk management - Google Patents

Real-time insurance policy underwriting and risk management Download PDF

Info

Publication number
US20060100912A1
US20060100912A1 US10/537,636 US53763605A US2006100912A1 US 20060100912 A1 US20060100912 A1 US 20060100912A1 US 53763605 A US53763605 A US 53763605A US 2006100912 A1 US2006100912 A1 US 2006100912A1
Authority
US
United States
Prior art keywords
proximity
location
data
article
landmark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/537,636
Other languages
English (en)
Inventor
C. Kumar
David Dyrnaes
Tim Von Kaenel
Jonathan Goodwin
Jared Wayman
Craig Trivelpiece
Joseph Mihalich
Anthony Jenkins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Paradigm Alliance Inc
Questerra Corp
Original Assignee
Questerra LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/388,666 external-priority patent/US7107285B2/en
Application filed by Questerra LLC filed Critical Questerra LLC
Priority to US10/537,636 priority Critical patent/US20060100912A1/en
Assigned to QUESTERRA LLC reassignment QUESTERRA LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VON KAENEL, TIM A., WAYMAN, JARED P., GOODWIN, JONATHAN D., JENKINS, ANTHONY PAGE, KUMAR, C. SURESH, MIHALICH, JOSEPH, TRIVELPIECE, CRAIG EVAN, DYRNAES, DAVID NEIL
Assigned to QUESTERRA CORPORATION reassignment QUESTERRA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DYRNAES, DAVID NEIL, GOODWIN, JONATHAN D., JENKINS, ANTHONY PAGE, KUMAR, C. SURESH, MIHALICH, JOSEPH, TRIVELPIECE, CRAIG EVAN, VON KAENEL, TIM A., WAYMAN, JARED P.
Publication of US20060100912A1 publication Critical patent/US20060100912A1/en
Assigned to THE PARADIGM ALLIANCE, INC. reassignment THE PARADIGM ALLIANCE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: QUESTERRA LLC
Assigned to QUESTERRA LLC reassignment QUESTERRA LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: QUESTERRA CORP.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/80Information retrieval; Database structures therefor; File system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
    • G06F16/81Indexing, e.g. XML tags; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries

Definitions

  • the present invention relates to real time insurance policy underwriting and risk management.
  • Insurance companies may insure against personal harm, property damage, and business interruption caused by a specified peril.
  • perils or perilous events
  • a natural disaster e.g., a tornado, a hurricane, an earthquake, a flood, etc.
  • a manmade disaster e.g. a release of hazardous material from an industrial plant, a terrorist attack, arson, etc.
  • an insurance company may receive information from an existing or prospective customer from which an evaluation may be made about the appropriateness of underwriting the policy.
  • an insurance agent When an insurance agent receives a request for an insurance policy, the agent may receive existing or prospective customer data from the policy such as: 1) the name and address of the requesting entity (e.g. an individual or a company and the address of the property to be covered); 2) the requested coverage type (e.g. life insurance or property insurance for a specified peril); 3) the desired amount of coverage, deductible, and premium; and 4) any other information that the insurance company may use in evaluating whether to underwrite the policy.
  • the requesting entity e.g. an individual or a company and the address of the property to be covered
  • the requested coverage type e.g. life insurance or property insurance for a specified peril
  • the desired amount of coverage, deductible, and premium e.g. life insurance or property insurance for a specified peril
  • any other information e.g. life insurance or property insurance for a specified peril
  • An insurance company may then evaluate such existing or prospective customer data to determine whether underwriting the requested insurance policy is appropriate. For example, an insurance company may consider how accepting the proposed insurance policy will affect their: 1) total revenue (e.g. an additional policy should increase the insurance company's total revenue by the policy's premium); 2) total exposure (e.g., an additional policy should increase the insurance company's total exposure by the policy's loss coverage); 3) probable maximum loss (PML) (e.g., an additional policy should increase the insurance company's PML, the amount of loss expected based on the total exposure underwritten for a specified zone and perilous event times a predetermined PML loss factor).
  • PML probable maximum loss
  • a PML loss factor may vary based on an estimated likelihood that a specified peril (e.g., a tornado) may occur in a specified zone (e.g., Dallas, Tex.) to cause a specified degree of damage (e.g., 10 million). It is also known to those skilled in the art that a PML loss factor may vary for various areas within a specified high risk zone (e.g. an area within a zone may have had far more tornadoes than other areas within the same zone).
  • a specified peril e.g., a tornado
  • a specified zone e.g., Dallas, Tex.
  • a specified degree of damage e.g. 10 million
  • the insurance company may base its evaluation on a predetermined standard, such as PML for a specified peril in a specified high risk zone not exceeding a specified PML limit. For example, if accepting a prospective policy would (by adding one or more locations for coverage for a specified peril in a specified high risk zone) increase the PML for this zone and peril above a predetermined PML limit (also known as CAP limit), then the policy may be presumptively denied. Alternatively, if accepting a prospective policy would not (by adding one or more locations for coverage for a specified peril in specified high risk zone) increase the PML for this zone and peril above the CAP limit, then the policy may be presumptively accepted.
  • a predetermined standard such as PML for a specified peril in a specified high risk zone not exceeding a specified PML limit.
  • the insurance company may wish to determine where the locations to be covered reside with respect to the specified high risk zone (e.g., in the zone, out of the zone, or near the zone).
  • the process presently used by the insurance companies to determine where locations to be covered reside in relation to a specified high risk zone and evaluate based on such a determination whether to underwrite a policy is manually-intensive, very slow, and often produces inconsistent and inaccurate results.
  • GIS geographic information system
  • GIS software applications are indeed available, such applications require interactive manual operation by a specially trained GIS operator.
  • the number of trained GIS operators is limited compared to the number of insurance underwriters drafting policies for evaluation.
  • GIS-based approach Even assuming that an insurance company has access to a GIS operator, other issued contribute to the slowness of the GIS-based approach. For instance, before a GIS operator may consider an existing or prospective customer's address, the address must be “encoded.” Gooding is a well-known GIS process performed by conventional programs that, among other things, associate a specific geographic location, such as a geospatial coordinate (e.g. latitude and longitude), with an address so that the location of the address may be displayed on a display device over a spatial (e.g., a map) image, which may include other geospatial information such as state or county boundaries, building locations, etc. A GIS operator may then observe on a GIS application's display the location of the encoded address from the prospective policy.
  • a geospatial coordinate e.g. latitude and longitude
  • the existing or prospective customer may be a company owning several subsidiary companies, which together have hundreds of business locations to be covered under the policy.
  • someone typically not the GIS operator
  • the GIS operator may have to wait for other personnel to create a comprehensive list of addresses for the prospective policy, assuming that such a list is prepared at all.
  • crating a comprehensive list of relevant addresses is, at best, inconsistently performed in the insurance industry.
  • address cleansing Before encoding, it is also desirable to perform an “address cleansing process,” regardless of whether a comprehensive address list is first created. At present, address cleansing is also, at best, inconsistently performed in the insurance industry. Address cleansing, a well-known process in the GIS field, generally involves comparing the address entries for a prospective policy against a reliable master address database to ensure that a final list of all addresses is accurate and, preferably, expressed, in a standard form before encoding. Such address cleansing may be useful when, for example, a customer-provided address (e.g., the Plaza Building) may fail to accurately identify a street address for a particular business location.
  • a customer-provided address e.g., the Plaza Building
  • Such failure may prevent the GIS operator and/or other insurance company evaluators from understanding the impact of underwriting a policy that includes an unrecognized high-risk business location. For example, if a prospective business address is incorrect, not corrected through address cleansing, and as a result placed outside a high risk zone (using the incorrect address), the policy may be accepted because the related business address appears to be outside of the high risk area, though in reality it may actually be inside the high risk area.
  • the GIS operator can begin work.
  • the basic task of the GIS operator is to display a prospective address location and determine whether it is in a zone of high risk, such as on the San Andreas Fault. To do this, the operator selects a prospective address for display on a GIS application screen and also selects a high risk zone for display from a database of predefined high risk zones.
  • the GIS operator Utilizing conventional spatial query techniques, the GIS operator is able to identify the spatial intersection of the location of the address and the high risk zone, in relation to the earth, utilizing, for example, longitude and latitude information. It is now possible for the operator to determine whether the address's location and the high risk zone intersect.
  • the selected address is not in the selected high risk zone, then there is a relative low risk that the peril associated with the selected high risk zone will affect the location being insured (e.g. if the selected address is outside of the selected high risk zone where, for example, tornadoes, are historically likely to hit, then the selected address is less likely of being affected by a tornado) and it may be presumptively accepted for coverage.
  • the GIS operator may then wish to identify the existing policies with business locations in the selected high risk zone, as they represent the current level of risk for the specified zone (e.g., PML for the specified zone and peril). For example, if the selected address is located in a predefined high risk zone including the San Andreas Fault, the GIS operator may wish to identify the existing policies with locations that have earthquake coverage in the same high risk zone.
  • the insurance company may evaluate the propriety of accepting a prospective policy from such a baseline list, which, as known to those with ordinary skill in the art, may be evaluated by itself or in conjunction with other relevant information, such as the added exposure and premium for the prospective policy.
  • the GIS operator may also wish to identify existing policies that are not precisely within the selected high risk zone, but perhaps within some reasonable proximity to it, as the insurance company evaluators may wish to consider these policies too in deciding whether to accept a prospective policy.
  • the GIS operator may vary the size and shape of the evaluation zone to consider existing policies outside but in proximity to a predefined high risk zone.
  • the GIS operator may experiment in other ways to provide the insurance company with the best possible list of existing policies (the existing risk) from which an evaluation can be made as to whether to accept a prospective policy.
  • GIS operator's task What is most relevant about the GIS operator's task is that it generally takes considerable time for the GIS operator to provide a list of relevant existing policies for the insurance company to use in considering whether to underwrite a prospective policy. Moreover, because there are several optional processes both preceding and coinciding with the GIS operator's task (e.g., whether or not to use: 1) a comprehensive prospective address list 2) address cleansing, or 3) any particular GIS operator technique), the evaluation results may vary widely depending on the selected options and the GIS operator.
  • the insurance company may use this date with predetermined standard (e.g., will the PML with the prospective policy included exceed a PML CAP limit that the company may want to stay under, such as $50 million, for the specified zone and peril, such as earthquake exposure in a predefined zone including San Francisco) to evaluate whether to accept a prospective policy.
  • predetermined standard e.g., will the PML with the prospective policy included exceed a PML CAP limit that the company may want to stay under, such as $50 million, for the specified zone and peril, such as earthquake exposure in a predefined zone including San Francisco
  • Such evaluation may take significant time, particularly when, as presently performed, it involves an insurance company representative manually entering the GIS operator data into a spreadsheet or an algorithm that embodies the company's predetermined evaluation standard.
  • the present process for evaluating whether to underwrite an insurance policy cannot be completed in real-time. Consequently, it is not possible for the process described above to result in a real-time evaluation result being returned to the user who submitted the evaluation request. Instead, the process that is followed by insurance companies today either takes days or weeks to return results to the user who submitted the evaluation request, or the GIS-based process does not occur at all.
  • FIG. 1 illustrates a computing environment in which certain implementations of the invention are implemented.
  • FIG. 2 illustrates, in a block diagram, a workflow through a computing environment in accordance with certain implementations of the invention.
  • FIG. 3 illustrates logic for generating a report for an insurance policy request in accordance with certain implementations of the invention.
  • FIG. 4A illustrates a landmark
  • FIG. 4B illustrates risk rings
  • FIG. 4C illustrates logic for identifying risk rings for a landmark in accordance with certain implementations of the invention.
  • FIG. 5 illustrates an initial screen displayed by an enterprise spatial system in accordance with certain implementations of the invention.
  • FIG. 6 illustrates a setup screen for events and landmarks in accordance with certain implementations of the invention.
  • FIG. 7 illustrates a setup events screen in accordance with certain implementations of the invention.
  • FIG. 8 illustrates a setup event ring attributes screen in accordance with certain implementations of the invention.
  • FIG. 9 illustrates a setup event damage rates screen in accordance with certain implementations of the invention.
  • FIG. 10 illustrates a setup PML rating details screen in accordance with certain implementations of the invention.
  • FIG. 11 illustrates a setup landmarks screen in accordance with certain implementations of the invention.
  • FIG. 12 illustrates logic for a user interface flow for an underwriting system 132 in accordance with certain implementations of the invention.
  • FIG. 13 illustrates a screen provided by an underwriting system for uploading of information from a file in accordance with certain implementations of the invention.
  • FIG. 14 illustrates a screen provided by an underwriting system for entering address information in accordance with certain implementations of the invention.
  • FIG. 15 illustrates a screen provided by an underwriting system for mapping fields from a spreadsheet to an enterprise spatial system format in accordance with certain implementations of the invention.
  • FIG. 16 illustrates a screen provided by an underwriting system for entering a company name in accordance with certain implementations of the invention.
  • FIG. 17 illustrates a screen provided by an underwriting system with encoded results in accordance with certain implementations of the invention.
  • FIG. 18 illustrates a screen provided by an underwriting system for address resolution in accordance with certain implementations of the invention.
  • FIG. 19 illustrates a screen provided by an underwriting system for address resolution for non-encoded locations in accordance with certain implementations of the invention.
  • FIG. 20 illustrates a screen provided by an underwriting system for a spatial interface to manually correct a genocide in accordance with certain implementations of the invention.
  • FIG. 21 illustrates a screen provided by an underwriting system for searching by address in accordance with certain implementations of the invention.
  • FIG. 22 illustrates a screen provided by an underwriting system for searching by company name in accordance with certain implementations of the invention.
  • FIG. 23 illustrates an ambiguous results screen provided by an underwriting system in which company name, city, and state are displayed in accordance with certain implementations of the invention.
  • FIG. 24 illustrates a screen provided by an underwriting system for searching by policy number for an existing business in accordance with certain implementations of the invention.
  • FIG. 25 illustrates a screen provided by an underwriting system for quick search by ZIP code in accordance with certain implementations of the invention.
  • FIG. 26 illustrates a screen provided by an underwriting system for multi-peril rating results in accordance with certain implementations of the invention.
  • FIG. 27 illustrates a screen provided by an underwriting system for rating result details by location and by peril in accordance with certain implementations of the invention.
  • FIG. 28 illustrates a screen provided by an underwriting system for exporting rating results to a file in accordance with certain implementations of the invention.
  • FIG. 29 illustrates a screen provided by an underwriting system for saving results for a temporary period of time in accordance with certain implementations of the invention.
  • FIG. 30 illustrates a screen provided by an underwriting system displaying selected rating results on a map in accordance with certain implementations of the invention.
  • FIG. 31 illustrates a screen provided by an underwriting system displaying selected rating results on a map when risk manager functionality is available in accordance with certain implementations of the invention.
  • FIG. 32A illustrates a location specific PML flow in accordance with certain implementations of the invention.
  • FIG. 32B illustrates a location specific PML flow in accordance with certain alternative implementations of the invention.
  • FIG. 33 illustrates a screen provided by an underwriting system for location specific PML calculations in accordance with certain implementations of the invention.
  • FIG. 34 illustrates a screen provided by an underwriting system to provide a summary of locations for individual analysis in accordance with certain implementations of the invention.
  • FIG. 35 illustrates a screen provided by an underwriting system to provide a summary of location specific PML calculations in accordance with certain implementations of the invention.
  • FIG. 36 illustrates a screen provided by an underwriting system for displaying location specific PML results in accordance with certain implementations of the invention.
  • FIG. 39 illustrates a screen provided by an underwriting system for displaying rating results for a user with an external role in accordance with certain implementations of the invention.
  • FIG. 40 illustrates a main approver/reviewer screen provided by an underwriting system in accordance with certain implementations of the invention.
  • FIG. 41 illustrates a screen provided by an underwriting system after an approval process is continued from FIG. 40 in accordance with certain implementations of the invention.
  • FIG. 42 illustrates a screen provided by an underwriting system to allow writing or rejection of a policy in accordance with certain implementations of the invention.
  • FIG. 43 illustrates a screen provided by an underwriting system with summary report status in accordance with certain implementations of the invention.
  • FIG. 44 illustrates an architecture diagram in accordance with certain implementations of the invention.
  • FIG. 45 illustrates process flow in accordance with certain implementations of the invention.
  • FIG. 46 illustrates an enterprise spatial system schema and a generic insurance (GI) schema that are provided in accordance with certain implementations of the invention.
  • GI generic insurance
  • FIGS. 47A and 47B illustrate logic for proximity analysis in accordance with certain implementations of the invention.
  • FIG. 48 illustrates an insurance solution flow in accordance with certain implementations of the invention.
  • FIG. 49 illustrates a screen showing proximity analysis with rings at different distances from an epicenter in accordance with certain implementations of the invention.
  • FIG. 50 illustrates proximity analysis process in accordance with certain implementations of the invention.
  • FIG. 51 illustrates a proximity analysis screen in accordance with certain implantations of the invention.
  • FIG. 52 illustrates manual point tools in accordance with certain implementations of the invention.
  • FIG. 53 illustrates a screen showing a sample selection of an XY coordinate in accordance with certain implementations of the invention.
  • FIG. 54 illustrates an initial proximity analysis screen for generic proximity analysis in accordance with certain implementations of the invention.
  • FIG. 55 illustrates a second proximity analysis screen for generic proximity analysis in accordance with certain implementations of the invention.
  • FIG. 56 illustrates a third proximity analysis screen for generic proximity analysis in accordance with certain implementations of the invention.
  • FIG. 57 illustrates a third proximity analysis screen with summary options for generic proximity analysis in accordance with certain implementations of the invention.
  • FIG. 58 illustrates a screen provided by the proximity analysis manager with a proximity analysis full report in accordance with certain implementations of the invention.
  • FIG. 59 illustrates a screen provided by the proximity analysis manager with a point n′ view report in accordance with certain implementations of the invention.
  • FIG. 60 illustrates a screen provided by the proximity analysis manager with a proximity summary in accordance with certain implementations of the invention.
  • FIG. 61A illustrates a table provided by the proximity analysis manager of landmark proximity analysis totals in accordance with certain implementations of the invention.
  • FIG. 61B illustrates a table provided by the proximity analysis manager of proximity aggregates in accordance with certain implementations of the invention.
  • FIG. 62 illustrates a proximity summary provided by the proximity analysis manager in accordance with certain implementations of the invention.
  • FIG. 63 illustrates a screen of a details report in accordance with certain implementations of the invention.
  • FIG. 64 illustrates an initial screen for an event driven wizard in accordance with certain implementations of the invention.
  • FIG. 65 illustrates a second screen for an event driven wizard that shows the addition of a landmark option in accordance with certain implementations of the invention.
  • FIG. 66 illustrates a third screen for an event driven wizard in accordance with certain implementations of the invention.
  • FIG. 67 illustrates a proximity summary in accordance with certain implementations of the invention.
  • FIG. 68 illustrates a layer control provided by the proximity analysis in accordance with certain implementations of the invention.
  • FIG. 69 illustrates proximity analysis menus in accordance with certain implementations of the invention.
  • FIG. 70 illustrates a screen provided by the proximity analysis manager to allow selection of a proximity analysis for editing in accordance with certain implementations of the invention.
  • FIGS. 71A and 71B illustrate screens provided by the proximity analysis manager to allow deletion of a proximity analysis for editing in accordance with certain implementations of the invention.
  • FIG. 72 illustrates a screen provided by the proximity analysis manager to save a proximity analysis in accordance with certain implementations of the invention.
  • FIG. 73 illustrates a screen provided by the proximity analysis manager that allows selection of users for assigning access privileges in accordance with certain implementations of the invention.
  • FIG. 74 illustrates a screen provided by the proximity analysis manager for Saving To a layer in accordance with certain implementations of the invention.
  • FIG. 75 illustrates a screen provided by the proximity analysis manager for inputting information for the Save To option in accordance with certain implementations of the invention.
  • FIG. 76 illustrates proximity analysis for an insurance industry scenario in accordance with certain implementations of the invention.
  • FIG. 77 illustrates customer specific inputs for a formula for generating PML in accordance with certain implementations of the invention.
  • FIG. 78 illustrates a center point and a selected point for which a policy may be issued in accordance with certain implementations of the invention.
  • FIG. 79A illustrates a stepped relationship in accordance with certain implementations of the invention.
  • FIG. 79B illustrates a linear relationship in accordance with certain implementations of the invention.
  • FIG. 79C illustrates a logarithmic relationship in accordance with certain implementations of the invention.
  • FIG. 80 illustrates a NAC structure that is used to determine a NAC in accordance with certain implementations of the invention.
  • FIG. 81 illustrates a rating process in accordance with certain implementations of the invention.
  • FIG. 82 illustrates metadata used to implement ring analysis in accordance with certain implementations of the invention.
  • FIG. 83 illustrates metadata to support proximity analysis functionality for a customer in the insurance business in accordance with certain implementations of the invention.
  • FIG. 84 illustrates a sample handle table 8400 in accordance with certain implementations of the invention.
  • FIG. 85 illustrates a representation of a Handle Manager class in accordance with certain implementations of the invention.
  • FIG. 86 illustrates a sequence diagram that describes the client and ESS server interaction for proximity image/proximity summary generation in accordance with certain implementations of the invention.
  • FIG. 87 illustrates an ESS system service context diagram in accordance with certain implementations of the invention.
  • FIG. 88 illustrates a new business approval process in accordance with certain implementations of the invention.
  • FIG. 89 illustrates a policy renewal process in accordance with certain implementations of the invention.
  • FIG. 90 illustrates a process 9000 of an annual in force book of business review in accordance with certain implementations of the invention.
  • FIG. 91 illustrates an additional data entry process in accordance with certain implementations of the invention.
  • FIG. 92 illustrates an ETL process in accordance with certain implementations of the invention.
  • FIG. 93 illustrates a map view in accordance with certain implementations of the invention.
  • FIG. 94 illustrates a screen with event information, ring information, and ring weighting in accordance with certain implementations of the invention.
  • FIG. 95 illustrates a portal entry screen in accordance with certain implementations of the invention.
  • FIG. 96 illustrates a portal menu application service site map in accordance with certain implementations of the invention.
  • FIG. 97 illustrates a sample of a Portal Menu application service main page and subsequent screen flow based on user selections in accordance with certain implementations of the invention.
  • FIG. 98 illustrates a screen of a selected map image with a map summary in accordance with certain implementations of the invention.
  • FIG. 99 illustrates a screen of a selected map image with an analysis summary in accordance with certain implementations of the invention.
  • FIG. 100 illustrates a point n′ view tool in accordance with certain implementations of the invention.
  • FIG. 101 illustrates a full report screen in accordance with certain implementations of the invention.
  • FIG. 102 illustrates an analysis summary in accordance with certain implementations of the invention.
  • FIG. 103 illustrates a sample network implementation to connect a client data center and an enterprise spatial system secure data facility to enable real-time access to ESS system services in accordance with certain implementations of the invention.
  • FIG. 104 illustrates an internet connectivity diagram in accordance with certain implementations of the invention.
  • FIG. 105 illustrates a system architecture in accordance with certain implementations of the invention.
  • FIG. 106 illustrates a table of application services in accordance with certain implementations of the invention.
  • FIG. 107 illustrates a table of portal application service assignments in accordance with certain implementations of the invention.
  • FIG. 108 illustrates a top-level portal site map in accordance with certain implementations of the invention.
  • FIG. 109 illustrates a screen of a set of features available for the corporate risk manager user in accordance with certain implementations of the invention.
  • FIG. 110 illustrates a screen that shows the reporting menu page and its associated links in accordance with certain implementations of the invention.
  • FIG. 111 illustrates a screen that shows an ESS admin menu page and its associated links in accordance with certain implementations of the invention.
  • FIG. 112 illustrates a screen in accordance with certain implementations of the invention.
  • FIG. 113 illustrates a table of data layers in accordance with certain implementations of the invention.
  • FIG. 114 illustrates a table of landmark location fields in accordance with certain implementations of the invention.
  • FIG. 115 illustrates a table of policy location fields in accordance with certain implementations of the invention.
  • FIG. 116 illustrates a ring analysis wizard screen in accordance with certain implementations of the invention.
  • FIG. 117 illustrates screen 2 in accordance with certain implementations of the invention.
  • FIG. 118 illustrates a screen in which the Ring Attributes section is disabled in accordance with certain implementations of the invention.
  • FIG. 119 illustrates a screen with the expanded Show Options link in accordance with certain implementations of the invention.
  • FIG. 120 illustrates a table of different scenarios that may be requested by a user in accordance with certain implementations of the invention.
  • FIG. 121 illustrates a ring analysis Results and Summary screen in accordance with certain implementations of the invention.
  • FIG. 122 illustrates a screen in accordance with certain implementations of the invention.
  • FIG. 123 illustrates a screen of a save landmark address example in accordance with certain implementations of the invention.
  • FIG. 124 illustrates a screen of a save landmark latitude/longitude example in accordance with certain implementations of the invention.
  • FIG. 125 illustrates a table of landmark ring analysis totals in accordance with certain implementations of the invention.
  • FIG. 126 illustrates a table of landmark ring analysis by ring totals in accordance with certain implementations of the invention.
  • FIG. 127 illustrates a screen in accordance with certain implementations of the invention.
  • FIG. 128 illustrates an underwriter application service screen flow in accordance with certain implementations of the invention.
  • FIG. 129 illustrates a main underwriter application service screen, which is a location list screen, in accordance with certain implementations of the invention.
  • FIG. 130 illustrates a table of four combinations of user data entered for a Find Company Query in accordance with certain implementations of the invention.
  • FIG. 131 illustrates a table of columns for a Company Name List in accordance with certain implementations of the invention.
  • FIG. 132 illustrates a company location search results dialog in accordance with certain implementations of the invention.
  • FIG. 133 illustrates a table of columns for a location Results List in accordance with certain implementations of the invention.
  • FIG. 134 illustrates a encoding process Results dialog that is used to display results of a encoding process in accordance with certain implementations of the invention.
  • FIG. 135 illustrates a screen displaying location records in accordance with certain implementations of the invention.
  • FIG. 136 illustrates a table describing a data source for a location list columns in accordance with certain implementations of the invention.
  • FIG. 137 illustrates a table listing columns of data that may be exported in accordance with certain implementations of the invention.
  • FIG. 138 illustrates a sample CSV file in accordance with certain implementations of the invention.
  • FIG. 139 illustrates a reporting application service screen flow in accordance with certain implementations of the invention.
  • FIG. 140 illustrates a total book of business by landmark report in accordance with certain implementations of the invention.
  • FIG. 141 illustrates a new business by landmark report in accordance with certain implementations of the invention.
  • FIG. 142 illustrates a new business by landmark report in accordance with certain implementations of the invention.
  • FIG. 143 illustrates a table of columns for a policy detail in accordance with certain implementations of the invention.
  • FIG. 144 illustrates an admin application service custom screen flow in accordance with certain implementations of the invention.
  • FIG. 145 illustrates a screen for setting up landmarks in accordance with certain implementations of the invention.
  • FIGS. 146 and 147 illustrate a screen for setting up events in accordance with certain implementations of the invention.
  • FIG. 148 illustrates an admin application service business table screen flow in accordance with certain implementations of the invention.
  • FIG. 149 illustrates an admin application service ESS delegated screen flow in accordance with certain implementations of the invention.
  • FIG. 150 illustrates a table for policy data access rights in accordance with certain implementations of the invention.
  • FIG. 151 illustrates a primary table in accordance with certain implementations of the invention.
  • FIG. 152 illustrates a table of views of a client data store in accordance with certain implementations of the invention.
  • FIG. 153 illustrates a table of physical and logical layers in accordance with certain implementations of the invention.
  • FIG. 154 illustrates a ETL process in accordance with certain implementations of the invention.
  • FIG. 155 illustrates a data integration services flow in accordance with certain implementations of the invention.
  • FIGS. 156A and 156B illustrate administration scenarios 1 and 2 in accordance with certain implementations of the invention.
  • FIGS. 157A, 157B , and 157 C illustrate data integration services scenario 3 in accordance with certain implementations of the invention.
  • FIGS. 158A, 158B , and 158 C illustrate another data integration services scenario in accordance with certain implementations of the invention.
  • FIG. 159 illustrates screen with a list of existing known data sources for a given customer in accordance with certain implementations of the invention.
  • FIG. 160 illustrates a screen with an example of a possible treatment for how to add a new data source in accordance with certain implementations of the invention.
  • FIG. 161 illustrates a preference menu in accordance with certain implementations of the invention.
  • FIG. 162 illustrates a screen with a list of data sources available to a give data admin in accordance with certain implementations of the invention.
  • FIG. 163 illustrates an example of a screen used for a batch type data source in accordance with certain implementations of the invention.
  • FIG. 164 illustrates an example of a screen used for a transaction type data source.
  • FIG. 165 illustrates a screen with advanced edit menus in accordance with certain implementations of the invention.
  • FIG. 166 illustrates a table of editing extension points in accordance with certain implementations of the invention.
  • FIG. 167 illustrates how overlapping polygons may be modified in different ways in accordance with certain implementations of the invention.
  • FIGS. 168A and 168B illustrate objects split by selection and/or intersection in accordance with certain implementations of the invention.
  • FIG. 169 illustrates objects to be split by a drawn line in accordance with certain implementations of the invention.
  • FIG. 170 illustrates multi-polygons in accordance with certain implementations of the invention.
  • FIG. 171 illustrates examples of shapes that cannot be represented by a single multi-polygon in accordance with certain implementations of the invention.
  • FIG. 172 illustrates a screen for shaded area thematic mapping in accordance with certain implementations of the invention.
  • FIG. 173 illustrates a screen for sized symbols thematic mapping in accordance with certain implementations of the invention.
  • FIG. 174 illustrates a screen for shaded symbols thematic mapping in accordance with certain implementations of the invention.
  • FIG. 175 illustrates an architecture of a computer system that may be used in accordance with certain implementations of the invention.
  • Certain implementations of the invention enable a more efficient and consistent evaluation of whether an insurance company should underwrite an insurance policy. Moreover, certain implementations of the invention may utilize conventional geospatial query techniques to provide in real-time, rather than in days or weeks, the results of the evaluation back to a user who submitted the request for evaluation. To this end, certain implementations of the invention may permit a user to submit existing or prospective customer data, such as a company name and address, and promptly receive an evaluation report recommending acceptance or denial of the request for insurance coverage, or requesting the user to contact the insurance company for further consideration of a prospective policy.
  • existing or prospective customer data such as a company name and address
  • certain implementations of the invention provide an automated technique to more efficiently and consistently evaluate existing or prospective customer data provided by the user and report back to the user an appropriate answer (e.g., the policy may be accepted, denied, or further consideration is merited) in real time, such as a matter of seconds as opposed to days or weeks.
  • Certain implementations of the invention also enable an insurance company to define high risk zones, based on a selected landmark (a landmark may be a specified point, such as a predefined point of a building or structure, or a specified area, such as a flood zone).
  • a landmark may be a specified point, such as a predefined point of a building or structure, or a specified area, such as a flood zone).
  • the user may also define and select a perilous event for the landmark, such as an explosion, a fire, a release of hazardous material, a flood, etc.
  • the user may also define zones in proximity to the landmark that have variable user-defined loss factors.
  • Such user-defined high risk zones, including associated perils and loss factors may be added to a data store for use in evaluation whether an insurance company should underwrite an additional insurance policy that may involve covering locations in a specified high risk zone for a specified peril.
  • Such data may be made available to a user of a client application connected to a continuously-running server without having to shut down the server, and without requiring the user to log onto the server again to gain access to newly-entered high risk zones (and their associated perils and loss factors) for real-time evaluations.
  • FIG. 1 illustrates a computing environment in which certain implementations of the invention are implemented.
  • a client computer 100 is connected via a network 190 to a server computer 120 .
  • the client computer 100 may comprise any computing device known in the art, such as a server, mainframe, workstation, personal computer, hand held computer, laptop telephony device, network appliance, etc.
  • the network 190 may comprise any type of network, such as, for example, a Storage Area Network (SAN), a Local Area Network (LAN), Wide Area Network (WAN), the Internet, an Intranet, etc.
  • the client computer 100 includes system memory 104 , which may be implemented in volatile and/or non-volatile devices.
  • One or more client applications 110 may execute in the system memory 104 .
  • user interfaces 112 may be displayed by components of the enterprise spatial system 130 at server computer 1200 .
  • the server computer 1200 includes system memory 122 , which may be implemented in volatile and/or non-volatile devices.
  • An enterprise spatial system 130 executes in the system memory 122 .
  • the enterprise spatial system 130 includes an underwriting system 132 , a risk manager 134 that includes a proximity analysis manager 136 , a spatial editor 138 , and data integration services 140 (also referred to as Extraction, Transformation, and Loading (ETL)). Additional components and/or services 142 may also be provided by the enterprise spatial system 130 (e.g., those depicted in FIG. 2 )
  • components 132 , 136 , 134 , 138 , and 140 are illustrated as separate components within an enterprise spatial system 130 , the functionality of the components 132 , 136 , 134 , 138 , and 140 may be implemented in fewer or more or different components than illustrated. Additionally, the functionality of the components 132 , 136 , 134 , 138 , and 140 may be implemented at a Web application server computer or other server computer that is connected to the server computer 1200 . Additionally, one or more server applications 160 may execute in system memory 122 .
  • the server computer 1200 provides the client computer 100 with access to data in one or more data stores 170 (e.g., data stores).
  • data store 170 is illustrated as directly connected to server computer 1200
  • tables 150 and other data e.g., the locations for an insurance company's existing policies and other policy details
  • data store 170 may be stored in data stores at other computers connected to server computer 1200 .
  • tables 150 are referred to herein for ease of understanding, other types of structures may be used to hold the data that is described as being stored in tables 150 .
  • an operator console 180 executes one or more applications 182 and is used to access the server computer 1200 and the data store 170 .
  • the data store 170 may comprise an array of storage devices, such as Direct Access Storage Devices (DASDs), Just a Bunch of Disks (JBOD), Redundant Array of Independent Disks (RAID), virtualization device, etc.
  • DSDs Direct Access Storage Devices
  • JBOD Just a Bunch of Disks
  • RAID Redundant Array of Independent Disks
  • FIG. 2 illustrates, in a block diagram, workflow through a computing environment in accordance with certain implementations of the invention.
  • FIG. 2 represents a system data work flow diagram for simultaneously integrating enterprise data with third party data using a processing center and a live data center, processing spatially referenced data, and providing access to the data.
  • FIG. 2 illustrates several additional components of an enterprise spatial system provided by certain implementations of the invention, including (1) a Geographical Information System (GIS) processing center/operations center 210 , (2) a data center 220 , (3) a fulfillment center 230 , (4) enterprise integration 240 (which may be part of the data center 220 ), and (5) client software 250 (e.g., one or more client applications).
  • the client software 250 executes on a client system 252 , which has a display screen on which a UI screen or other data may be displayed for viewing by, for example, a user.
  • client system 252 has a display screen on which a UI screen or other data may be displayed for viewing by, for example, a user.
  • client system 252 has a display screen on which a UI screen or other data may be displayed for viewing by, for example, a user.
  • client system 252 is illustrated, it is to be understood that many client systems may access data in the production center 222 at any time, including other server systems acting as clients
  • GIS processing center/operations center 210 which processes data (e.g., converting Tagged Image File Format (TIFF) to Joint Photographic Expert Group (JPEG) format) at run time, and makes the processed data available at run time to users without disrupting the data center 220 operations.
  • data e.g., converting Tagged Image File Format (TIFF) to Joint Photographic Expert Group (JPEG) format
  • enterprise data sources 202 government/Freedom of Information (FOI) public data 204
  • satellite imagery data 206 is input to the GIS processing center/operations center 210 in the form of vector data, tabular data, third party imagery, and/or raw tiled TIFF imagery.
  • the satellite imagery data 206 is obtained using airplanes flying over areas and taking photographs with cameras that provide high resolution images.
  • the data is stored in an interim archive tape library 212 .
  • the GIS processing center 214 retrieves data from the interim archive tape library and forwards the data to pre-production processing 216 .
  • the data is stored in the production center 222 for client software 250 access.
  • the GIS processing center/operations center 210 handles many different operations in pre-production processing 216 due to irregularities in GIS data from various sources.
  • the GIS Processing Center performs data compression (e.g., of image data) at run time during the data transformation stage. Compressing data is important because some data (e.g., GIS image data) cannot be accessed over the Internet due to the size of the data.
  • some image data is in a graphical data format called TIFF.
  • TIFF is a tag-based image file format that is designed to promote the interchange of digital image data. TIFF provides a multi-purpose data format and is compatible with a wide range of scanners and image-processing applications.
  • TIFF is one of the most popular and flexible of the current public domain raster file formats.
  • implementations of the invention convert large image data to a compressed data format, such as JPEG.
  • JPEG permits a greater degree of compression than other image formats, such as TIFF, enabling quicker downloading times for larger graphics.
  • JPEG documents appear to retain almost complete image quality for most photographs.
  • the data acquisition stage procures data from various sources (e.g., enterprise data 202 , government/FOI public data 204 , and satellite imagery data 206 ).
  • sources e.g., enterprise data 202 , government/FOI public data 204 , and satellite imagery data 206 .
  • Data acquisition is an important function of the GIS processing center 214 .
  • data extraction stage data is staged for use, the data integrity is verified, and data quality control is provided.
  • the following actions occur on data: color fusion, histograms, matching, misaiming, re-sampling, tiling, and compression, which are well known in the art.
  • the following actions occur: metadata is created for the data layers, different data layers are described using metadata, data (e.g., vector, raster or tabular data) is stored in spatial data store, and GIS data is uploaded to the data center 220 for deployment.
  • the data center 220 includes a staging system 221 .
  • Data from the staging system 221 is sent to the production center 222 .
  • Data from the staging system 221 may also be stored at a master archive tape library 223 and sent to offsite storage 224 .
  • the staging system 221 provides a replica of the production center 222 and is used to test the client software, enterprise spatial system software (e.g., server software at servers in the enterprise spatial system), and data.
  • the staging system 221 is used to ensure that a new version of client software and/or data will work correctly when deployed to the production center 222 .
  • the production center 222 is used to store data accessed by users via client software 250 .
  • the data center 220 supports many operations. For example, the data center 220 hosts raster data, vector data, and tabular data for users to access using various client software 250 (e.g., client applications such as, a browser client, a thin client, or an enterprise client). Various techniques of accessing data (e.g., tabular data of sales information) from an enterprise data store and geocoding non-spatially referenced data are supported. In particular, although geocoding may be performed in the GIS processing center/operations center 210 , the data center 220 also supports functions that require geocoding in the production center 222 . The data center 220 also manages network communications between enterprise users and the data center 220 . The data center 220 supports linear scalability to be able to expand the enterprise spatial system provided by implementations of the invention to handle larger data sets (i.e., larger amounts of data) at run time.
  • client software 250 e.g., client applications such as, a browser client, a thin client, or an enterprise client.
  • client applications e.
  • the data center 220 provides security and access controls to enterprise users to securely access their enterprise data, allows enterprise users to simultaneously access dynamic data from their enterprise data store 202 and the data center 220 , and processes requests from, for example, client applications by supporting client applications' functionality.
  • the data center 220 also supports different types of analytical functions, such as querying for data, generating data reports, retrieving data layers, accessing data, and sharing and/or collaborating with multiple users.
  • the fulfillment center 230 receives orders for data (e.g., particular data, a particular image or a set of images), prepares the data (e.g., creates or collects the appropriate data), and delivers the data to a requested location. Further details of order fulfillment are provided below.
  • data e.g., particular data, a particular image or a set of images
  • Enterprise integration 240 allows users to access securely their enterprise data that is stored outside of the data center 220 .
  • Enterprise integration 240 also determines whether enterprise data are pre-geocoded or not, and, if the enterprise data is not pre-geocoded, the enterprise data is parsed and geocoding information is provided by determining the proper longitude and latitude information to be associated with the enterprise data elements (e.g., records).
  • the enterprise integration technology 240 also provides the ability to interact with and retrieve data from third party applications using various Application Programming Interfaces (API) exposed by the third party applications and makes the data available to the client systems of the data center 220 .
  • API Application Programming Interfaces
  • the enterprise integration technology 240 also provides various Application Programming Interfaces (API) to third party applications so that different third party applications, including enterprise applications, can access production data from the data center 220 .
  • the APIs provide defined function calls to third party applications so that users can interact with the enterprise spatial system provided by implementations of the invention to utilize stored data (e.g., raster data, vector data, and tabular data) for spatially analyzing enterprise data.
  • stored data e.g., raster data, vector data, and tabular data
  • the APIs also allow third party applications to utilize the various analysis functions provided by the enterprise spatial system.
  • the client software 250 allows users to manipulate spatial data interactively by making dynamic data requests from the data center 220 .
  • the client software 250 includes, for example, browser-based clients, thin clients, thick clients, and enterprise clients.
  • the client software 250 handles all user actions promptly and retrieves spatial data from the data center 220 in a timely manner.
  • the client software 250 and the data center 220 rely on using a multiple data layering mechanism. That is, unlike legacy GIS software, the data center 220 does not combine multiple data layers as one composite image when transmitting spatial data to users over a network. Instead, the data center 220 retrieves proper spatial data layers from various data stores based on client requests and converts the data layers to individual images.
  • the data center 220 sends the images separately to the client software 250 .
  • the client software caches the images for the different spatial data layers to avoid generating new image files every time users change back and forth between different spatial data layers.
  • the client software may combine multiple images to form a composite image that is displayed to a user.
  • the enterprise spatial system includes components illustrated in FIG. 1 as well as components illustrated in FIG. 2 .
  • the components illustrated in FIG. 2 are used to provide interactive maps for use by the components illustrated in FIG. 1 .
  • FIG. 3 illustrates logic for generating a report for an insurance policy request in accordance with certain implementations of the invention.
  • an insurance agent may receive a request for an insurance policy for coverage against terrorism and/or some other peril.
  • the agent may also receive existing or prospective customer data for the desired policy such as: 1) the name and address of the entity seeking coverage (e.g. an individual or a company name and the address of the property to be covered); 2) the requested coverage type (e.g., property insurance for a loss resulting from a terrorist attack and/or some other peril); and 3) the desired amount of coverage, deductible and premium.
  • the request and the existing or prospective customer data may be submitted to the insurance agent, or any other insurance company representative, using any conventional means.
  • the insurance company representative such as the underwriter, using the request and the existing or prospective customer data reported in block 320 , may activate a conventional Web browser or any other client application on client computer 100 to access server computer 120 and build a comprehensive address list.
  • the representative may enter on client computer 100 one or more addresses that were provided. Additionally, the representative may enter on client computer 100 a search query consisting of an estimated spelling for the entity (e.g., in case the correct spelling is unknown to the representative). Server computer 120 may then access one or more commercially available data stores 170 , such as, the U.S. Marketing File data store from Dun & Bradstreet, to return for display on client computer 100 a list of entity names that begin with the representative's search query. Using client computer 100 , the representative may then select the correct entity. If the insurance company representative knows the correct entity name, then such an entity name search may be skipped.
  • a search query consisting of an estimated spelling for the entity (e.g., in case the correct spelling is unknown to the representative).
  • Server computer 120 may then access one or more commercially available data stores 170 , such as, the U.S. Marketing File data store from Dun & Bradstreet, to return for display on client computer 100 a list of entity names that begin with the representative's search query.
  • the representative may be prompted to select search criteria for a data store search for related entities.
  • the representative may select from search criteria including: 1) whether to search for related entities (e.g., subsidiaries, affiliates, and the like for the entity; presumably, for an individual entity, as opposed to a business entity, no such search would be desired); and 2) if a related entity search is requested, whether any geographical, or other, restrictions apply.
  • server computer 120 may access one or more commercially available data stores 170 , such as the U.S. Marketing File data store from Dum & Bradstreet, and employ a conventional search routine to identify the sought-after entities in data store 170 .
  • Server computer 120 may then obtain the sought-after entities located in the entity-name-based search of data store 170 .
  • the representative may also enter on client computer 100 additional relevant addresses not originally provided by the existing or prospective customer or located in the entity-name-based search.
  • data store 170 employed for the entity-name-based search may not be up to date to include the latest business locations for a given entity.
  • a comprehensive address list may be built for the existing or prospective customer, which may include: 1) addresses originally provided by the existing or prospective customer; 2) addresses found in the entity-name-based search, such as related entities; and 3) any other addresses for entities that are related to the existing or prospective customer but not found in the entity-name-based search.
  • the representative may also enter on client computer 100 any remaining existing or prospective customer data for the desired policy such as: 1) the requested coverage type (e.g., property insurance for a loss resulting from a terrorist attack and/or some other peril); 2) the desired amount of coverage, deductible, and premium; and 3) any other information that the insurance company wants to consider in evaluating whether to underwrite the requested insurance policy.
  • server computer 120 cleanses the addresses in the comprehensive address list by executing any well-known address cleansing process, such as the common address matching technology of the Address Broker software from Sagent, Inc. of Mountain View, Calif.
  • server computer 120 may compare the addresses in the comprehensive address list with addresses in a reliable master address data store 170 , such as the USPS Address Matching address data store from the U.S. Postal Service. From the comparison, server computer 120 may correct addresses in the comprehensive address list that were incorrect prior to the address cleansing.
  • data store 170 that may be utilized with block 322 to build a comprehensive address list may be “precleansed.” Specifically, an address cleansing process, such as described in block 324 , may be performed on the addresses in data store 170 that may be utilized in block 322 to build a comprehensive address list. The address cleansing of data store 170 may be performed before a user employs system 10 . Consequently, run-time address cleansing, such as block 324 , may be skipped.
  • server computer 120 geocodes the addresses in the comprehensive address list by executing any well-known geocoding process, such as that performed by Address Broker from Sagent Technology, Inc. of Mountain View, Calif.
  • the geocoding process may associate with each address in the comprehensive address list a unique geographic identifier, such as a latitude and a longitude value.
  • each address location may be evaluated with any spatial query techniques well-known to those skilled in the GIS arts to determine the address's location relative to any other geocoded data sets (e.g., whether a geocoded address location intersects with a geocoded high risk zone).
  • data store 170 that may be utilized with block 322 to build a comprehensive address list may be “pregeocoded.”
  • a geocoding process such as described in block 326 , may be performed on the addresses in data store 170 that may be utilized in block 322 to build a comprehensive address list.
  • the geocoding of data store 170 may be performed before a user employs system 10 . Consequently, run-time geocoding, such as block 326 , may be skipped.
  • server computer 120 may select an address (now cleansed and geocoded) from the comprehensive address list.
  • the list may include a single address, if, for example, the existing or prospective customer requested coverage for a single location.
  • the list may include several addresses, if the existing or prospective customer requested coverage of a number of locations. In the latter case, server computer 120 may select one or more addresses at a time from the comprehensive address list for processing, as discussed below in blocks 332 - 340 .
  • server computer 120 may retrieve the requested coverage type (e.g., property insurance, including coverage for a loss resulting from a tornado) previously entered at block 320 . Utilizing any well-known spatial query techniques, server computer 120 may then access data store 170 , which may contain predefined high risk zones. Each predefined high risk zone may be associated with a predetermined peril (e.g., a tornado) and a predetermined zone where the perilous event has a specified probability of occurring (e.g., specified counties in the Midwestern United States known as Tornado Alley), as known to those skilled in the art. Moreover, a predetermined high risk zone may cover one or more geographically discrete areas for the predetermined peril.
  • a predetermined peril e.g., a tornado
  • a predetermined zone where the perilous event has a specified probability of occurring (e.g., specified counties in the Midwestern United States known as Tornado Alley), as known to those skilled in the art.
  • a predetermined high risk zone may cover one or more geographical
  • Data store 170 may also include one or more predefined high risk zones for terrorism-based perils.
  • FIG. 4C illustrates logic for building high risk zones for such terrorism-based and other perils.
  • block 330 is not limited to selecting a single predefined high risk zone; multiple high risk zones may be selected for evaluation.
  • server computer 120 may be conventionally programmed to query data store 170 using any well-known spatial query techniques to retrieve, for example: 1) high risk zones; 2) any specific area within a high risk zone (such as an area with an elevated loss factor due to, for example, historical data indicating elevated risk); and 3) existing policies within a high risk zone that may also contain the same spatial coordinates as one or more of the address(3s) selected in block 328 .
  • server computer 120 may be conventionally programmed to query data store 170 using any well-known spatial query techniques to retrieve, for example: 1) high risk zones; 2) any specific area within a high risk zone (such as an area with an elevated loss factor due to, for example, historical data indicating elevated risk); and 3) existing policies within a high risk zone that may also contain the same spatial coordinates as one or more of the address(3s) selected in block 328 .
  • it may be necessary to geocode the high risk zones and the locations for the existing policies either prior to the processing of block 330 or during the processing of block 330 .
  • Server computer 120 may select a predefined high risk zone that matches the requested coverage type. For example, if the requested coverage type was for storm damage anywhere in the United States, server computer 120 may retrieve a predefined high risk zone for tornadoes in the United States.
  • server computer 120 may compare one or more selected addresses with the selected high risk zone to determine whether any prospective address location(s) are within the selected high risk zone. Geocoding of the addresses and the high risk zones may facilitate this comparison. Moreover, the matching process of block 332 may alternatively consider a modification of a selected high risk zone (e.g. it may be expanded by some predefined quantity to encompass nearby locations that may not otherwise be in the zone or it may be reduced by some predefined quantity to encompass fewer locations than would otherwise be in the zone).
  • server computer 120 may utilize any well-known spatial query techniques to retrieve from data store 170 the existing policies and associated covered locations that are also located within the selected high risk zone.
  • server computer 120 may be conventionally programmed to query data store 170 using any well-known spatial query techniques to identify the high risk zones that include the longitude and latitude values for one or more selected address(es) of the submitted policy, as well as to identify all the existing policies and associated covered locations whose longitude and latitude values are also within the identified high risk zones.
  • server computer 120 may make an evaluation using any predetermined insurance company standard.
  • server computer 120 and/or data store 170 may be conventionally programmed to determine a revised PML (including the new policy) and whether the revised PML exceeds a predetermined PML limit. If the PML limit is not exceeded, at block 340 a report may be sent back to client computer 100 to the insurance company representative to indicate that the new policy may be issued. Alternatively, if the PML limit is exceeded, at block 340 a report may be sent back to client computer 100 to indicate to the insurance company representative that the new policy may not be issued or that further information may be considered before the policy may be accepted.
  • predetermined insurance company standard for the evaluation of block 338 is not limited to the example described above (whether the revised PML exceeds a predefined PML limit).
  • server computer 120 may be conventionally programmed to make an evaluation of whether to underwrite a policy using any predetermined standard desired by the insurance company.
  • a report may be made to the insurance company representative to indicate that underwriting the insurance policy is acceptable.
  • server computer 120 may retrieve from data store 170 those policies that are also located within the selected high risk zone.
  • a report may also be made to indicate to the insurance company representative that underwriting the insurance policy is acceptable for the prospective addresses that are not within the selected high risk zone.
  • server computer 120 may make an evaluation using any predetermined insurance company standard.
  • server computer 120 may be conventionally programmed to determine a revised PML and whether the revised PML exceeds a predetermined PML limit.
  • server computer 120 may consider prospective addresses in the high risk region either individually or in one or more groups. Assuming single-address consideration, if the PML limit is not exceeded for the considered address, at block 340 a report may be sent back to client computer 100 to indicate to the insurance company representative that the new policy may be issued for that address location.
  • a report may be sent back to client computer 100 to indicate to the insurance company representative that the location may not be covered by the policy or that further information may be considered before the policy may be accepted.
  • a policy for multiple addresses may be accepted for some locations and not accepted for others (e.g., if a single branch office of a multi-branch bank is deemed to be too high or a risk to insure, it may be excluded from the policy covering the other branch offices for the particular business).
  • FIG. 4A illustrates a landmark
  • FIG. 4B illustrates risk rings
  • FIG. 4C illustrates logic for identifying risk rings for a landmark in accordance with certain implementations of the invention.
  • an insurance company representative may use a Web browser on client computer 100 to custom design a high risk zone, such as a perceived terrorist target.
  • the custom-designed high risk zone may then be stored in data store 170 for use with the method described for FIG. 3 .
  • FIG. 4A represents a map display 442 that may show on client computer 100 a user-selected image 444 that may include landmark 446 , which may correspond to a high risk zone, such as a perceived terrorist target.
  • the user may enter on client computer 100 the address for landmark 446 , which is reported to server computer 120 for display on client computer 100 .
  • the user may point to user-selected image 444 , zoom into an appropriate resolution (to show landmarks, such as buildings), and select with the mouse the desired landmark 446 .
  • the address for the identified landmark may be conventionally cleansed as discussed above with reference to block 424 in the method of FIG. 3 .
  • the user may identify on client computer 100 a perilous event, such as specified type of terrorist attack on landmark 446 (e.g., a conventional bomb with specified characteristics, a biological weapon with specified characteristics, a chemical weapon with specified characteristics, etc.).
  • Server computer 120 may have a number of such perilous events predefined for the user to select with client computer 100 . Additionally, the user may enter with client computer 100 any desired perilous event and define its characteristics, as desired.
  • the user may identify on client computer 100 risk rings for the selected landmark 446 , as depicted in FIG. 4B .
  • Each risk ring 448 a - 448 d represents an area in proximity to the landmark 446 .
  • the user may select for each risk ring 448 a - 448 d an expected loss factor.
  • the user can enter a loss factor for each risk ring 448 a - 448 d based on the expected damage for the selected perilous event.
  • Block 456 may permit the user to create on client computer 100 specified loss profiles for a specified perilous event, as well as to edit existing high risk zones.
  • Risk rings 448 a - 448 d need not be circular, as shown in FIG. 4B , and may take any desired shape.
  • the high risk zone identified in blocks 450 - 556 is conventionally geocoded and stored at block 460 in data store 170 for use with the logic of FIG. 3 .
  • a new high risk zone Once a new high risk zone has been created with its related perilous event and loss factors, it may be stored on data store 170 for immediate use in evaluating insurance policies, as described by the logic of FIG. 3 . Moreover, server computer 120 does not need to be shut down and restarted and client computer 100 does not need to be interrupted in any way before the new high risk zones may be accessed for such evaluation. This allows insurance companies to dynamically and in real-time add, change, or delete additional high risk zones, peril events and loss factors without having to shut down system 10 and interrupt the method of real-time insurance policy evaluation of FIG. 3 .
  • Insurance underwriting is a dynamic business that requires intimate knowledge of the book of business and company-specified thresholds for accumulated risk based on natural and manmade perils.
  • a peril may be described as a specific risk or cause of loss covered by an insurance policy.
  • underwriting is the process of insuring someone for something.
  • An underwriter's primary responsibility is to produce, underwrite, and quote new and renewal business for their company.
  • Being location aware is an integral component of underwriting.
  • a location may be described as a physical location that may be tied to a policy. By having immediate knowledge of policyholders' locations and their proximity to catastrophe zones or targets allows underwriters to distribute risk.
  • the underwriting system 132 With services provided by the underwriting system 132 , the guesswork is taken out of the equation when underwriting insurance. Underwriters are provided with access to real-time location assessment and prospect approval workflow with the underwriter system. Starting with an address, the underwriting system 132 is a sophisticated underwriting service that allows users to quickly and easily input location information and determine whether to write, investigate or not write policies based on, for example, peril, coverage type (i.e., a type of insurance policy) or line of business. The underwriting system 132 provides several techniques to input location or policy details and quickly determine whether the location is in proximity to perils and appropriately set or adjust pricing premiums. A premium may be described as an amount the policyholder pays for insurance coverage. To have a clear understanding of impact on current book of business, the underwriting system 132 provides company specific ratings and exposes location verification, audit, and assessment prior to writing, renewing or terminating business.
  • the underwriting system 132 provides an easy to use technique for rating new business against perils, such as terrorist events.
  • the underwriter system provides underwriters with an interactive process to determine whether to write, renew or reject business.
  • the underwriting system 132 provides several interactive techniques for inputting prospective policyholder details, including the ability to upload records from a file, input an individual address, and search by company.
  • the underwriting system 132 allows underwriters to input policy details and save prospective information for a company-specified period of time.
  • Underwriters are provided with the ability to perform peril-specific queries to determine whether prospective policies are in man made, natural catastrophe, or company-specified peril zones.
  • a peril zone may be described as a specific peril territory that is defined by, for example, a point, a line, or a polygon.
  • the underwriting system 132 includes natural catastrophe zone data for several catastrophes, such as terrorism, hail, wind, flood, hurricane, and earthquake.
  • the underwriting system 132 interacts with the geocoding service available in the enterprise spatial system in both interactive and batch modes prior to rating locations. Location ratings are driven by company-specific business rules, and rating results are configurable on a company-by-company basis. The ability to drilldown from individual rating results to location details is supported by the underwriting system 132 .
  • the underwriting system 132 also provides users with the option to view locations on a map. This option is configurable (e.g., through a customer administration tool provided by the enterprise spatial system).
  • the underwriting system 132 supports approval of prospective policies as unbound business and creates location-specific PMLs that are applied to the current book of business so that users have a real-time snapshot of their percentage of CAP at any given time.
  • a PML may be described as an estimated monetary loss (e.g., expressed as a percentage of total value) experienced by a structure or a collection of structures when subjected to a natural or manmade peril of a certain magnitude or with a given probability of occurrence in a stated time period.
  • a CAP may be described as a capacity or the supply of insurance available to meet demand. Capacity depends on the financial ability to accept risk. CAP for an individual insurance company is the maximum amount of risk that can be underwritten based on the insurance company's financial company.
  • Lists of rated locations may be exported or saved for a given period of time for further investigation. This process reduces the need to input information multiple times and improves the underwriter's efficiency.
  • the underwriting system 132 determines location-specific exposure so that underwriters have knowledge of accumulated exposure at an individual location. This allows an underwriter to appropriately spread risk.
  • the underwriting system 132 also provides role-based access to location details. For example, this allows internal users to have detailed views into prospective policies and external agents to have a write or reject view.
  • An agent may be an individual who works for an insurance company or may be an individual who works for multiple insurance companies and who sells insurance policies.
  • Web services are provided to enable use of the underwriting system 132 via the Web.
  • the underwriting system 132 increases efficiency of the underwriting process for writing, renewing or changing policies.
  • the underwriting system 132 identifies locations that are in high risk areas or areas of overexposure, provides immediate feedback on what action to take for a given policy, compares how prospective business impacts current bound business, review high risk policies or locations by management, cleanses addresses for locations and provides feedback regarding the level of address match.
  • the underwriter system supports business requirements to enable underwriters to write, renew or terminate business based on proximity to natural or manmade perils and the impact to the current book of business.
  • the underwriter system provides users with the ability for real-time batch uploads or individual entries of location addresses.
  • the underwriter system provides users with the ability to quickly verify whether there are any associated perils, either man-made or natural, that are in the vicinity of the location.
  • the underwriter system supports business rules for distance to perils that are company specific.
  • the underwriter system provides a spatial reference (e.g., geocode) for location information.
  • a spatial reference e.g., geocode
  • the underwriter system supports company-specific thresholds that are configurable for acceptable geocodes.
  • the underwriter system provides the ability to store company-specific business rules for resolving ambiguous addresses in both interactive and batch geocoding of locations.
  • the underwriter system provides users with a technique to resolve non-geocoded or ambiguous addresses.
  • the underwriter system provides the ability to store and reference whether geocodes are system-generated or manually entered.
  • the underwriter system allows data input fields to be company-specific.
  • the underwriter system provides users with the option to audit location information against a third party business data store (e.g., a Dun & Bradstreet data store), provided they have a licensed copy of the data store.
  • the underwriter system provides users with the option to verify location information against a third party business data store (e.g., a Dun & Bradstreet data store), provided they have a licensed copy of the data store.
  • the underwriter system provides users with the flexibility to check locations against pre-defined (e.g., defined by the enterprise spatial system or by a company) peril zones and returns which zones apply to each location.
  • pre-defined e.g., defined by the enterprise spatial system or by a company
  • the underwriter system provides users with the ability to do cursory checks of geographic areas to determine whether there are any company-defined perils in the area or whether they are free and clear to proceed without any further investigation.
  • the underwriter system stores a list of company-specific peril zones (e.g. Hot Zones).
  • the underwriter system enables rating calculations and results to be configurable by company.
  • the underwriter system enables probable peril-based loss calculations to be configurable by company.
  • the underwriter system enables probable peril-based loss calculations for individual prospects or policies to be generated dynamically and then applied to current CAPs.
  • the underwriter system enables users to approve business that will be written or renewed.
  • the underwriter system enables users to add unbound policies to a latest snapshot of bound policy data until the unbound policies are bound.
  • unbound policies become bound, the unbound policies are purged from a temporary storage file, as they are uploaded with the current policy batch.
  • the underwriter system enables users to reject business.
  • the underwriter system provides users with the ability to save, store and retrieve pending business for a company-specific period of time.
  • the underwriter system enables purging of unbound policies after a company-set period of time.
  • the underwriter system provides users with the option to view locations on a map for further investigation.
  • the underwriter system enables users to compare prospective policies to current book of business.
  • the underwriter system provides users with the ability to add approved policies to the current running percentage of CAP total.
  • the underwriter system allows users to export a location list of rated locations.
  • the underwriter system allows users to export an entire location list with both rated and non-rated locations. For locations that surpass a company-specified threshold, company-defined warnings may be returned.
  • the underwriter system provides underwriters with summary reports regarding transactions and status of work in progress during a given period of time (e.g. daily, weekly, monthly).
  • the underwriter system provides users with the ability to view rating results and drill into location details such as ring, distance from peril epicenter, liability, probable loss, current rating.
  • the underwriter system provides users with the ability to input company-specific policy, coverage, and location-level details to assess impact against CAP at the location level for locations that do not pass a set threshold.
  • the underwriter system provides company-specific views for rating results. For example, rating results may be sorted by line of business, coverage type, or peril. Also, the underwriter system enables setting business rules for thresholds by line of business. A six digit latitude/longitude coordinate is returned with each location populated in the rating results. The latitude/longitude coordinates for locations are included in data exports.
  • the underwriter system provides role-based views into location information. For example, internal underwriters may desire to have more detailed views into the data than outside agents.
  • the underwriter system determines the impact of prospects against in force business at the same location.
  • the underwriter system aggregates prospective and in force policies at the same location to understand impact of writing the business.
  • FIG. 5 illustrates an initial screen 500 displayed by the enterprise spatial system 130 in accordance with certain implementations of the invention. From the initial screen 500 , a user may select risk manager, underwriter for underwriting assistance, reports to obtain reports, setup to modify (e.g., add, update or delete) events and landmarks, or geocode to geocode data.
  • risk manager e.g., underwriter for underwriting assistance
  • reports e.g., reports to obtain reports
  • setup to modify e.g., add, update or delete
  • geocode e.g., geocode to geocode data.
  • FIG. 6 illustrates a setup screen 600 for events and landmarks in accordance with certain implementations of the invention. For changes to event details, a user selects setup events, and for changes to landmarks, a user selects setup landmarks.
  • FIG. 7 illustrates a setup events screen 700 in accordance with certain implementations of the invention.
  • a user may select an event type (such as maximum loss, building collapse, etc.) and then select ring details, damage rate or PML rating tables to edit the selected data.
  • an event type such as maximum loss, building collapse, etc.
  • FIG. 8 illustrates a setup event ring attributes screen 800 in accordance with certain implementations of the invention. A user may make changes to the number of rings and ring distances for a particular event type.
  • FIG. 9 illustrates a setup event damage rates screen 900 in accordance with certain implementations of the invention.
  • a user may make changes to damage rates by ring and coverage type for a particular event type.
  • FIG. 10 illustrates a setup PML rating details screen 1000 in accordance with certain implementations of the invention.
  • a user may make changes to PML rating descriptions, group codes, and ring information for a particular event.
  • a group code may be described as a code for a rating that can be described as high, medium, low or other customer-defined designation.
  • FIG. 11 illustrates a setup landmarks screen 1100 in accordance with certain implementations of the invention.
  • a user may enter new landmarks, enable landmarks, and add financial details (e.g., landmark CAP) for a landmark.
  • financial details e.g., landmark CAP
  • an underwriter works at an insurance company.
  • the underwriter uses the underwriting system 132 to write a new policy for an existing account, to change an existing account, to write renewals, to write new business, to write a policy for an individual peril, to write a policy for a multi-peril, to resolve ambiguous addresses, to view selected locations on an interactive map, to save locations to a company, and to review and/or approve a prospective policyholder.
  • a policyholder may be described as an entity (e.g., an individual or a company) who buys an insurance policy.
  • the underwriter As for writing a new policy for an existing account, the underwriter has an existing account for a customer, who wants to add Worker's Comp to the current Property Insurance the customer has with the insurance company. The underwriter wants to quote a new policy for the customer. The underwriter verifies information related to the account. Using the underwriter system, the underwriter runs a check against each location to see whether any fall within the company defined peril zones to determine whether or not to write the new policy. In this example, none of the locations come up with a “Do Not Write” status. The underwriter adds a price premium for three locations that fall within high risk areas and quotes the cost of the insurance to the customer.
  • Changes to an existing account include, for example, deleting something from a policy or adding something to the policy.
  • a company has consolidated their business due to lower than expected sales volume and has closed six store locations.
  • the underwriter uses the underwriting system 132 to adjust the existing policy to drop these locations.
  • the underwriter uses the policy number as a unique identifier to retrieve the policy, deletes the six locations, and reassesses the risk rating to determine the change in premium.
  • a company may acquire 15 new locations throughout the country.
  • the underwriter uses the underwriting system 132 to adjust the existing policy to cover these additional locations.
  • the underwriter uses the policy number as a unique identifier to pull up the existing policy.
  • the underwriter has a spreadsheet with the additional locations accessible for rating. While rating the new locations, the underwriter runs into two high-risk locations and assesses how the location's individual risk compares to the company's current overall risk prior to adding the locations to the existing policy, using the underwriting system 132 . Additionally, with the underwriting system 132 , the underwriter also determines an adjusted pricing for the policy.
  • the underwriter assesses whether or not to renew the policy based upon the underwriting guidelines set by the insurance company.
  • the underwriter uses the policy number as the unique identifier for reviewing the policy and checks the policy against company-defined peril zones to determine whether to write the policy.
  • the underwriter either writes the policy for renewal, increases the premium or declines to renew the policy.
  • the underwriter receives a request from a company that is looking to switch insurance providers and needs property and casualty insurance for its business.
  • the underwriter collects information relating to the locations that would be a part of the policy as well as information related to the policy and coverage needed.
  • the underwriter uses the underwriting system 132 to determine whether writing this new policy is beneficial to the insurance company.
  • the underwriter reviews each location to be included in the policy against perils, such as terrorism, hail, wind, flood, hurricane, and earthquake.
  • the underwriter uses the underwriting system 132 to determine whether or not the underwriter can underwrite an account for a peril, such as terrorism.
  • the underwriter gathers the appropriate account and location information.
  • each location in the policy is run against the insurance company business rules to determine whether or not any of these locations may put the insurance company over a specified cap.
  • the underwriter quotes the policy and receives affirmation of whether the policy may be accepted.
  • the underwriter submits the policy as bound business so that the paperwork may be prepared.
  • the underwriter uses the underwriting system 132 to determine whether or not the underwriter can underwrite an account for multiple perils, such as terrorism, hail, wind, flood, hurricane, and earthquake.
  • the underwriter gathers the appropriate account and location information.
  • each location in the policy is run against the insurance company business rules to determine whether or not any of these locations may put the insurance company over specified caps.
  • the underwriting system 132 establishes caps at the portfolio, line, organization structure, and peril levels. In this example, four of the locations come up as falling in a high-risk area.
  • the underwriter reviews these accounts individually to determine how each individual account affects the caps.
  • the underwriter finds two locations that put the insurance company over one or more caps.
  • the underwriter may submits the information for management review.
  • an agent sends the underwriter a list of 67 locations to review for a new prospective policy.
  • the underwriter uses the underwriting system 132 to verify the validity of the address information contained in the list. In particular, the underwriter submits the addresses for geocoding to verify whether there is a valid match. Eight of the 67 addresses are returned by the underwriting system 132 with multiple results that could potentially be the correct location. The underwriter reviews the suggestions for each of the eight addresses and selects a desired location.
  • the underwriter may select any of the locations the underwriter wishes to view on a map.
  • the underwriting system 132 presents the underwriter with an interactive map on which the underwriter may turn on and off corporate, non-corporate and peril-specific layers and perform further visual analysis of clusters and intersections of risk.
  • the underwriter may be returned to a ratings screen.
  • the underwriter may realize that there additional information should be collected before running a location specific PML on one of the locations that fell within a high-risk zone. Rather than rerun all the locations once the underwriter gets in contact with the policyholder for additional information, the underwriter uses the underwriting system 132 to save all of the information related to the current review of the account. At another time, the underwriter may reopen the saved account to complete a review (e.g., once the underwriter has the additional information).
  • the insurance company may have an underwriting management team that receives requests from underwriters to review policies that appear to put the company at risk of overexposure in a particular area or where locations are in high-risk areas. A manager on the team may then be responsible for reviewing the account and providing the underwriter with a decision on whether to write or decline the business.
  • FIG. 12 illustrates logic for a user interface flow for an underwriting system 132 in accordance with certain implementations of the invention.
  • Control begins at block 1200 with a main underwriting system screen being displayed. From the main screen, a user may select tab 1202 . The tab may represent a search company option, an enter address option or an upload file option. If a search company option is selected, processing continues to block 1204 , and a user enters a company name with address filters.
  • a business data search may be performed (e.g., a Dun and Bradstreet (D&B) data store search) that checks the validity of one or more addresses in a location list (i.e., a list of addresses).
  • D&B Dun and Bradstreet
  • processing continues to block 1210 , otherwise, processing continues to block 1212 .
  • an ambiguous company dialog box may be displayed to allow the user to select one of multiple possible correct addresses for a desired location.
  • processing continues to block 1214 .
  • all locations for the chosen company are illustrated and processing continues to block 1240 .
  • processing continues to block 1220 .
  • the user may enter an address and processing continues to block 1240 .
  • processing continues to block 1230 .
  • a user may select a file of policy locations.
  • the user may browse to select the file (e.g., from a directory or a list of files).
  • the file is uploaded.
  • fields from the file may be mapped to the format of the data stored for the underwriting system 132 and processing continues to block 1240 .
  • the geocode service geocodes data (block 1241 ).
  • cleansed address data and latitude/longitude coordinates are sent to a peril rating service.
  • the peril rating service which has access to data on various perils (e.g., earthquakes, flood, wind, hail, etc.) rates the perils for at least one location.
  • a screen is populated with rating data.
  • multi-peril rating results are displayed for the user.
  • a user may select drilldown, export or analyze PML. If a user selects drilldown of a particular peril from the multi-peril rating results, processing continues to block 1252 .
  • a template for a selected peril is retrieved.
  • data for the selected peril is retrieved.
  • location and peril specific drilldown is displayed for the rating results. From this display, a user may close the display window (block 1258 ) and return to the multi-peril rating results (block 1248 ) or may export or print data ( 1259 ).
  • processing continues to block 1260 .
  • a user may select one or more locations. If the user, would like to deselect locations, the user may clear locations ( 1268 ). Once location selection is complete, processing continues to block 1262 .
  • the user may select a file type.
  • the user may select a file name.
  • the report is exported.
  • a user enters policy details for insurance or reinsurance.
  • a user may select next to continue to block 1276 or cancel to return to block 1272 .
  • a user may enter location details for each location for which PML analysis is to be performed.
  • a user may select next to continue to block 1280 . Additionally, a user may select cancel or back to return to block 1276 .
  • a PML analysis results are displayed. From this display, a user may close the display window (block 1282 ) or may export or print data (block 1284 ).
  • the underwriting system 132 supports the ability to input prospective policy location information and real-time imports of company locations and associated policy details from a file.
  • FIG. 13 illustrates a screen 1300 provided by the underwriting system 132 for uploading of information from a file in accordance with certain implementations of the invention.
  • a user selects an Upload File tab, browses to select a file, and uploads a file.
  • the user may map fields to the enterprise spatial system format.
  • the underwriting system 132 geocodes locations and resolves or exports geocodes that do not meet company-specific threshold. The user may then select locations for rating.
  • the underwriting system 132 also supports entering of address information on the fly.
  • FIG. 14 illustrates a screen 1400 provided by the underwriting system 132 for entering address information in accordance with certain implementations of the invention.
  • a user selects the Enter Address tab and enters address information.
  • FIG. 15 illustrates a screen 1500 provided by the underwriting system 132 for mapping fields from a spreadsheet to the enterprise spatial system format in accordance with certain implementations of the invention.
  • a user maps fields for geocoding by entering information into the appropriate fields (e.g., street address, city, etc.).
  • Address information may include, for example, any combination of address, city, state, and ZIP code (e.g., all four items, address with city and state or address with ZIP code.
  • the underwriter system provides an option to set a default for users to either map fields once and set them as the default for future uploads or to map each input file individually. The user may be prompted to fill in additional details, such as Account Name(Name Insured) and Line of Business.
  • the underwriting system 132 supports the option to audit address or location information against a third party data store (e.g., a Dun & Bradstreet data store, infoUSA, etc.). When matched against third party data, any results that do not match to an acceptable level are flagged, and the user is given the option to export unmatched addresses and resolve these offline.
  • a third party data store e.g., a Dun & Bradstreet data store, infoUSA, etc.
  • FIG. 16 illustrates a screen 1600 provided by the underwriting system 132 for entering a company name in accordance with certain implementations of the invention.
  • a user selects the Search Company tab and enters a partial or fill company name to search for that company.
  • Each location is geocoded (e.g., to at least a six-digit latitude/longitude coordinate, such as, 40.597285/ ⁇ 96.595166).
  • Each geocoded location has an associated field to define whether the geocoding result was system generated or manually generated. For those locations that do not geocode to a company specified threshold, a list of locations with scorecard results are returned to the user. These locations may be exported and saved to a file for correction and future upload and/or included with the rating results as ‘unrated’.
  • FIG. 17 illustrates a screen 1700 provided by the underwriting system 132 with geocoded results in accordance with certain implementations of the invention. In FIG.
  • a user is presented with geocoding results that indicate a geocoding accuracy (e.g., street level), a number of records at that level, and a percentage of records at that level.
  • a user may select Resolve to resolve ambiguous addresses (i.e., locations for which there are multiple similar addresses, such as a street address with North and South locations), and the underwriting system 132 attempts to resolve the address using, for example, third party data (e.g., a Dun & Bradstreet data store).
  • FIG. 18 illustrates a screen 1800 provided by the underwriting system 132 for address resolution in accordance with certain implementations of the invention.
  • a geocoding accuracy e.g., street level
  • a number of records at that level e.g., a number of records at that level
  • a percentage of records at that level e.g., a percentage of records at that level.
  • a user may select Resolve to resolve ambiguous addresses (i.e., locations for which there are multiple similar addresses, such as a street address
  • the underwriting system 132 displays ambiguous address results (i.e., a list of possible address matches for a single location at a time), and the user selects an appropriate address to be selected as the correct address. Then, the user may select the Next button to resolve another address.
  • ambiguous address results i.e., a list of possible address matches for a single location at a time
  • the user selects an appropriate address to be selected as the correct address. Then, the user may select the Next button to resolve another address.
  • a user is automatically taken to a rating screen.
  • the user may also select Save to save addresses, corresponding latitudes and longitudes, and geocoding result codes to a file.
  • the user may select Close to return to the location selection screen and continue to rate locations.
  • FIG. 18 provides a user interface with ambiguous options for the user to select from to resolve an address.
  • the underwriting system 132 provides the ability to use a map interface to resolve non-geocoded or ambiguous addresses. In certain implementations, this may be a separate service that is provided for records that are exported for address resolution.
  • FIG. 19 illustrates a screen 1900 provided by the underwriting system 132 for address resolution for non-geocoded locations in accordance with certain implementations of the invention.
  • FIG. 20 illustrates a screen 2000 provided by the underwriting system 132 for a spatial (e.g., map) interface to manually correct a geocode in accordance with certain implementations of the invention.
  • a spatial interface e.g., map
  • a user imports a list of locations or manually enters locations for address resolution by the geocoding system. Then, a user may select Correct locations individually by choosing the selection tool and manually correcting the location on a map (illustrated in FIG. 20 ). Then, the location of the address is corrected. Also, once a user completes correcting locations, the location list may be exported for re-import into the underwriting system 132 . In FIG. 20 , once a user selects the selection tool (e.g., a map icon) for a location from FIG. 19 , the user is presented with an interactive map centered on a current geocode result.
  • the selection tool e.g., a map icon
  • the user may zoom and pan the map and uses a selection tool to move the visual indicator of the current longitude and latitude to a new position on the map.
  • the user may select Update to save the new location.
  • the location is flagged by the underwriting system 132 as manually generated.
  • an option is provided by the underwriting system 132 to either include or overwrite the manually generated geocoding results.
  • address resolution is a configurable option.
  • the underwriting system 132 supports the option to audit location information to ensure correctness and completeness of location information and any accompanying location details, such as address, number of employees at location, average salary, etc. This information may be verified, for example, against a third party business directory data store. Any locations that do not meet the company-specified level of acceptable addresses may be saved to a file for further investigation. This is a configurable option.
  • the underwriting system 132 supports various techniques of searching for location information.
  • FIG. 21 illustrates a screen 2100 provided by the underwriting system 132 for searching by address in accordance with certain implementations of the invention.
  • this search supports one or more of the following fields: company name, address, city, state, and/or ZIP code.
  • a user selects the Enter address tab, enters address details, and selects the Find Address button. If an address is ambiguous, the underwriting system 132 provides the user with a list of possible address matches (i.e., ambiguous results list) and allows the user to select a desired address.
  • the underwriting system 132 also geocodes addresses and rates locations.
  • FIG. 22 illustrates a screen 2200 provided by the underwriting system 132 for searching by company name in accordance with certain implementations of the invention.
  • a user selects a Search Company tab and enters a partial or full company name, along with any address details to be used for filtering by the underwriting system 132 .
  • the company name search may be filtered by city, state, ZIP code or any combination of the three.
  • the underwriting system 132 may also check the entered company name against third part business location data, in which locations may be geocoded.
  • the underwriting system 132 may return ambiguous results for locations that have multiple entries matching the input criteria or a list of locations for a company in case a company has multiple locations.
  • 23 illustrates an ambiguous results screen 2300 provided by the underwriting system 132 in which company name, city, and state are displayed in accordance with certain implementations of the invention. From the list of locations, the user may select one or more locations for ratings and submit a request for ratings. In certain implementations, the search by company name feature is optional.
  • FIG. 24 illustrates a screen 2400 provided by the underwriting system 132 for searching by policy number for an existing business in accordance with certain implementations of the invention.
  • a user selects a Lookup Policy tab, enters a policy number, and selects a Find Policy button.
  • the search by policy number allows the user to enter an existing policy number and then submit an identified policy for rating.
  • the user is able to renew a policy with no changes, add locations to an existing policy, exclude locations from a policy, and/or analyze a location impact on the policy.
  • the search by policy number feature is an optional feature that is configurable during setup.
  • FIG. 25 illustrates a screen 2500 provided by the underwriting system 132 for quick search by ZIP code in accordance with certain implementations of the invention.
  • a use selects a Quick Check tab, enters a ZIP code, and selects the Check Now button.
  • a quick search is provided that may include a search by some administrative boundary, such as ZIP code, block group, census tract or county. This search will check to see if the prospective location or locations fall within any supported peril zone that is configured for a given company.
  • the quick search feature is an optional feature that is configurable during setup.
  • the search screens are capable of clearing individually selected results or all results, provide options to start a new search, and may store the results of multiple searches in rating results until results are cleared. Also, the number of search options are configurable on a company-by-company basis. (e.g. Company 1 may have ‘Upload File’ and ‘Enter Address’ and Company 2 may have all of the available search options).
  • the underwriting system 132 include the following system defined nationwide peril zones for the United States, including, for example, flood zones, seismic earthquake zones, earthquake fault lines, hail zones, wind zones, and tornado zones.
  • the peril zones are configurable for each company during company setup with the underwriting system 132 .
  • the underwriting system 132 allows customers to configure company-specific peril zones (e.g., hot zones, target landmarks, target cities, etc.).
  • the underwriting system 132 stores company-specific peril zones so that they may be queried when determining rating results.
  • the underwriting system 132 supports the ability to define which peril zones a location falls within. This includes system defined and company-defined peril zones. This information is returned in the rating results.
  • FIG. 26 illustrates a screen 2600 provided by the underwriting system 132 for multi-peril rating results in accordance with certain implementations of the invention. In particular, a user receives rating results for multiple submitted locations by peril.
  • the underwriting system 132 supports company-specific business rules for determining rating calculations.
  • the calculations may be peril-specific. There may be an overall rating that takes into consideration all peril zones that a location falls within. Rating results are configurable by company. Also, rating results may include an image to depict write, reject, escalate, a numeric value and/or a textual description.
  • the underwriting system 132 is capable of displaying warnings for prospective policies that pass a company-specified threshold (e.g., escalate to supervisor, flag for reinsurance, flag for premium, etc.). Reinsurance may be described as insurance that one insurance company provides to another insurance company as a hedge against catastrophic loss.
  • the underwriting system 132 also supports drilldowns by number of landmarks for certain peril zones (e.g., terrorism peril zones and displays the landmarks associated with a selected location, sorted by rating from highest to lowest.
  • Rating of locations is specific to an individual company (i.e., policyholder). Locations that pass the company-specified threshold for geocoding are rated and returned in a rating results window. The count for the number of locations rated is returned in the rating results window (e.g., 530 locations rated). The rating results may be sorted by column headings from highest to lowest/lowest to highest or alphabetically. The location data attributes that are returned in the initial rating results are configured during the company configuration and setup period.
  • the underwriting system 132 supports several fields in the rating results window, including, for example, company name, address, city, state, ZIP code, latitude, longitude, rating, peril zone pass/fail/escalate, and/or number of landmarks.
  • additional fields may be included during upload of files that are used for location-specific PML calculations, such as, line of business, coverage type, layer limit deductibles (i.e., the amount of loss paid by policyholders in dollar amount, as a percentage of a claim amount, or specified as an amount of time that elapses before benefits are paid), number of employees, and/or CAP.
  • line of business coverage type
  • layer limit deductibles i.e., the amount of loss paid by policyholders in dollar amount, as a percentage of a claim amount, or specified as an amount of time that elapses before benefits are paid
  • Each location within the rating results includes: 1) a visual indicator that depicts which peril zones affect this particular policy will be supported, and the indicator may be tied to company-specific business rules that are based on the percent of existing CAP they are at for a given peril and 2) a rating (and a separate rating field may be used for cases where there is a unique value that takes into account all perils that a location may fall within).
  • the visual indicator may or may not be associated with the rating.
  • FIG. 27 illustrates a screen 2700 provided by the underwriting system 132 for rating result details by location and by peril in accordance with certain implementations of the invention.
  • a user may drill down on location-specific peril details by clicking on the peril icon.
  • a user may also print, export or close drill down details. Drilldown may be performed for each location. Also, location details for drilldowns are flagged during company data configuration and setup. Location details may include data, such as company name, address, peril name/type (e.g.
  • landmark name or wind zone landmark name or wind zone
  • distance to peril epicenter 50 feet, 100 yards or 2.2 miles
  • ring number which refers to a “ring” around the peril, such as ring 2
  • buffer zone for area or line data
  • additional information about the peril zone e.g. 500 year flood zone
  • the underwriting system 132 supports the ability to export rating results.
  • FIG. 28 illustrates a screen 2800 provided by the underwriting system 132 for exporting rating results to a file in accordance with certain implementations of the invention.
  • a user may select one or more rated locations and select Export.
  • the underwriting system 132 exports the rated locations and associated information to a file.
  • an indication of the level of the peril is provided (e.g., with check marks and exclamation marks in circles with clear or colored backgrounds).
  • the company may export all rating results. If the company wishes to only export those results that have a rating, the company may sort based on rating, select the rated results, and choose the export button on the screen. When exporting results, the user has the option to export to various file formats (e.g., .xls, .csv, .pdf and .rtf file formats). The latitude/longitude coordinates for each location are included as part of the export.
  • the underwriting system 132 supports the ability to save unbound policies for a company-specified (e.g., up to ‘x’ days/months) period of time.
  • FIG. 29 illustrates a screen 2900 provided by the underwriting system 132 for saving results for a temporary period of time in accordance with certain implementations of the invention.
  • a user selects the Save button to save rating results.
  • the underwriting system 132 prompts the user to enter a name and description.
  • the underwriting system 132 also captures the user login name and the date the details were saved.
  • the user may open saved results by selecting an Open submenu from the File menu and by selecting from a list of saved rating results.
  • the underwriting system 132 saves location details by company name, user name (e.g., system generated logon name for user), and date saved (e.g., an effective date).
  • Authorized users may open saved work during the temporary storage timeframe. If saved results are submitted for approval, an option is provided to no longer consider the results as saved and to delete the results from a Saved Locations screen. Once the temporary storage timeframe has expired, the locations are purged from the data store. If the policy is bound prior to the temporary storage limit expiry, the policyholder is flagged or deleted from the temporary storage.
  • the underwriting system 132 supports the option for rating results to be displayed on an interactive map.
  • FIG. 30 illustrates a screen 3000 provided by the underwriting system 132 displaying selected rating results on a map in accordance with certain implementations of the invention.
  • the user selects a Show on Map button from the rating results screen to access the screen in FIG. 30 .
  • a map of selected locations is displayed on an interactive map.
  • the map is available for the users session and may be saved.
  • the user may pan or zoom to obtain location details by using an information tool.
  • the user may print or same the map or close the map view and return to the rating results.
  • FIG. 31 illustrates a screen 3100 provided by the underwriting system 132 displaying selected rating results on a map when risk manager 134 functionality is available in accordance with certain implementations of the invention.
  • a user selects a Show on Map button from the rating results screen to access the screen in FIG. 31 . If the user has access to the risk manager 134 , the map is displayed by the risk manager 134 . The user may then perform risk manager 134 functions that are configured for the company. The map is available for the users session and may be saved. The user may print or same the map or close the map view and return to the rating results.
  • the map extent reflects a best fit of locations plotted on the map.
  • the user is able to print or same the map to a file.
  • the user may also pan, zoom, and point and view locations on the map.
  • the rendering details for locations plotted on the map are set during initial company configuration, and locations plotted on the map are specific to individual sessions.
  • the underwriting system 132 supports a link from the mapping interface back to the rating results screen that were previously displayed.
  • the interactive map is a configurable option.
  • FIG. 32A illustrates a location specific PML flow in accordance with certain implementations of the invention.
  • a rated location input file 3202 is input, and location specific PML calculations are performed in block 3204 .
  • location details 3206 are also input, and these location details 3206 may be collected at location upload time.
  • Location PML results 3208 are output by the calculations in block 3204 and displayed in company specific views 3210 .
  • the view 3210 are closed, it is determined whether a save option was selected (block 3214 ). If a save option was selected, the location data is stored by company (block 3216 ), otherwise, the underwriting system 132 exits the company specific views and returns to the rating results screen (block 3218 ).
  • FIG. 32B illustrates a location specific PML flow in accordance with certain alternative implementations of the invention.
  • a rated location input file 3250 is input to policy and coverage data 3252 , which is input to location data 3254 , which is input to location specific PML calculations 3256 .
  • the output is location PML results 3258 .
  • the underwriting system 132 exits the current view and returns to another screen ( 3262 ). Additionally, export and print ( 3264 ) are available upon close.
  • FIG. 33 illustrates a screen 3300 provided by the underwriting system 132 for location specific PML calculations in accordance with certain implementations of the invention.
  • a user may select either insurance or reinsurance.
  • the coverage fields may change for reinsurance.
  • the user inputs policy specific information and policy level coverage details.
  • the user also determines which perils apply at the policy level.
  • the user selects Continue to enter location specific details.
  • FIG. 34 illustrates a screen 3400 provided by the underwriting system 132 to provide a summary of locations for individual analysis in accordance with certain implementations of the invention.
  • a user selects locations that individual PML calculations are to be run against, and the user selects Analyze.
  • the underwriting system 132 then performs individual PML analysis.
  • FIG. 35 illustrates a screen 3500 provided by the underwriting system 132 to provide a summary of location specific PML calculations in accordance with certain implementations of the invention.
  • the user may enter location details that are coverage and peril specific. Location level details may include, for example, company, address, city, county, state, ZIP code, total insured value, premium, limit, deductible, minimum deducible, maximum deductible, coverage, number of employees, payroll amount, location ID, year built, number of stories, occupancy type, insured quantity, wind construction type, earthquake construction type (e.g., soil type, liquefaction code, landslide code, crest zone), and/or distance to coast.
  • the user inputs location specific information in the screen of FIG. 35 .
  • the underwriting system 132 returns policy level information, and the user may edit the peril zone by coverage, enter a new location specific coverage, exclude a location or select the Finish button.
  • the supplied policy and location information is used to determine location specific PMLs.
  • FIG. 36 illustrates a screen 3600 provided by the underwriting system 132 for displaying location specific PML results in accordance with certain implementations of the invention.
  • the underwriting system 132 displays selected locations that were flagged by the user for location specific PML calculations by location and peril. The user may select locations for further investigation for impact to the CAP and then selects the Analyze button to continue. Fields affecting location-specific PMLs may be established during the company configuration process for validation that certain data is entered. These fields may be auto-populated as part of the file upload process or entered manually by the user, especially in the case of individual entries.
  • Customer-specific definitions for policy, location, coverage and peril zones may be defined in a configuration document during customer deployment. This information may be used for input to location-specific PMLs and output for detailed report views.
  • FIG. 37 illustrates a screen 3700 provided by the underwriting system 132 for displaying a detailed customer-specific multi-dimensional report in accordance with certain implementations of the invention.
  • a user may view, save, export or close such a report.
  • Detailed views into the resulting policy details i.e., post location-specific PMLs
  • Certain views of the reports may include displays by policy and location, by coverage and by peril zone, etc.
  • Role-based access allows some users with an internal role (e.g., company employees) to have detailed views into the rating results and some users with an external role (e.g., external agents) to have a write/reject new business view.
  • FIG. 38 illustrates a screen 3800 provided by the underwriting system 132 for displaying rating results for a user with an internal role in accordance with certain implementations of the invention. Users with an internal role have access to view full details and have drilldown capability.
  • FIG. 39 illustrates a screen 3900 provided by the underwriting system 132 for displaying rating results for a user with an external role in accordance with certain implementations of the invention.
  • the underwriting system 132 accumulates risk by line of business or peril type for a single location (e.g., a latitude/longitude coordinate). This aggregation takes into account either a) in force business or b) prospective policies combined with in force business, at a given physical location, number of locations, liability, and/or percent of CAP.
  • the underwriting system 132 uses company specific business rules to set rejection or price premium thresholds by line of business, coverage type or peril.
  • the underwriting system 132 also provides the ability to write new business. When new business is underwritten or renewed, the unbound business is submitted for review or approval.
  • FIG. 40 illustrates a main approver/reviewer screen 4000 provided by the underwriting system 132 in accordance with certain implementations of the invention. In particular, an approver may open saved policies. An approver may also select a poly by poly name and continue with the approval process.
  • FIG. 41 illustrates a screen 4100 provided by the underwriting system 132 after the approval process is continued from FIG. 40 in accordance with certain implementations of the invention. In particular, once an approver has selected a policy, the approver is presented with a list of locations that did not clear the initial rating process.
  • the approver may approve or decline locations for the prospective policy, may return to the Main Screen ( FIG. 40 ) to select another prospective policy, or may view on map, save, or export the locations.
  • FIG. 42 illustrates a screen 4200 provided by the underwriting system 132 to allow writing or rejection of a policy in accordance with certain implementations of the invention. In particular, a user may write or reject a policy from the rating results screen.
  • the underwriting system 132 tracks the status of unbound policies. Also, summary reports for underwriting transactions may be generated on a monthly basis.
  • FIG. 43 illustrates a screen 4300 provided by the underwriting system 132 with summary report status in accordance with certain implementations of the invention. Reports may also be compiled at the individual user level and may be accessible by said user. In certain implementations, reports include number of policies reviewed, number of policies approved, number of policies escalated, number of policy renewals, number of new policies, number of locations with location-specific PMLs generated, number of locations geocoded, number of locations not geocoded, number of locations in hot zones, and number of locations in peril zones. Summary reports are a company configurable option.
  • FIG. 44 illustrates an architecture diagram in accordance with certain implementations of the invention.
  • a risk manager 134 4402 and an underwriting system 132 4404 are provided by the enterprise spatial system.
  • the enterprise spatial system manages a set of entities such as data 4422 , functions 4424 , reports 4426 , and company/users 4428 . Additionally, the enterprise spatial system provides services and data 4430 , such as authentication/access/license management, logging/tracking, metadata management through customer admin services, ETL functions to manage data, and an application infrastructure to manage applications.
  • the risk manager 134 4402 presents data, functions and reports to users in a particular user presentation.
  • the underwriting system 132 4404 exposes a different presentation from the same underlying data, functions and reports structure.
  • a same infrastructure is used to build the risk manager 134 4402 and the underwriting system 132 4404 . For example, both may be accessed and manipulated similarly.
  • the underwriting system 132 4404 provides a set of UI functions (Upload file, Company Search, Address Search etc.), a set of customer specific server functions (such as PML procedures and proximity procedures) and a set of reports (such as Rating Report, Rating Drilldown report etc.).
  • the functions, custom server functions and reports are defined in an ESS schema ( FIG. 46 ).
  • the data uploaded from a file or entered manually by the user is stored in the customer specific schema. For the insurance customers this will be the Generic Insurance schema ( FIG. 46 ).
  • the data in the customer specific schema is accessed through metadata layer definitions in the ESS schema.
  • the functions and reports are associated with field definitions for the data layers.
  • FIG. 45 illustrates process flow 4500 in accordance with certain implementations of the invention.
  • a user may select the underwriting system 132 functions, upload data, analyze data, or get details about peril data.
  • the user submits requests at a client computer, which forwards the requests to an ESS server.
  • the ESS server includes an enterprise spatial system that includes the underwriting system 132 and the risk manager 134 .
  • FIG. 46 illustrates an enterprise spatial system schema 4600 and a generic insurance (GI) schema 4610 that are provided in accordance with certain implementations of the invention.
  • the ESS schema may be described as a set of tables, views, and other data store objects used to store information that controls the functions and behavior of the enterprise storage system 130 services and components.
  • the tables contain metadata related to users, roles, functions, locations of data, reports and other data objects. These data store objects, tables, and views are uniquely related to each other in a way that allows the easily retrieval and saving of information.
  • the GI schema may be as a set of tables, views, and other data store objects designed specifically to store insurance related data.
  • the tables are configured to allow for flexibility and performance. These tables, views, and objects may be used in conjunction with customer specific tables to provide a location to store a complete set of customer information.
  • the risk manager 134 includes a proximity analysis manager 136 for use, for example, with the insurance industry.
  • the proximity analysis manager 136 may also be used in a non-insurance situation.
  • the proximity analysis manager 136 performs analysis for one or multiple buffers around a feature.
  • the buffers are formed by “rings” or circles, but in other implementations, the buffers may take other forms.
  • FIGS. 47A and 47B illustrate logic for proximity analysis in accordance with certain implementations of the invention.
  • Control begins at block 4700 with a user starting proximity analysis (e.g., by selecting a tool provided by the risk manager 134 ).
  • a user chooses a proximity center, proximity dimensions, and a proximity analysis target data set.
  • the user's choices are sent as part of a request to a proximity analysis manager 136 .
  • the proximity analysis manager 136 retrieves metadata from a function metadata table for a user-specific function.
  • the target data items that fall within the proximity area e.g., circles
  • the user-specific function also may execute user-specific logic to calculate result data tailored, for example, to an individual user.
  • the proximity analysis manager invokes the user-specific function with the proximity center, proximity dimensions, and proximity target data set as the parameters to the user-specific function.
  • execution of the user-specific function identifies the data items from the target data set that fall within the proximity area or circles.
  • the proximity analysis manager 136 stores results from the execution of the user-specific function, including the results of user-specific logic execution, in a special table designed to hold the results of proximity analysis.
  • the proximity analysis manager 136 renders the data items from target data set that fall within the proximity areas and overlays the proximity area boundaries.
  • the proximity analysis manager 136 displays a proximity image to the user.
  • the proximity analysis manager 136 retrieves metadata from a function metadata table for a user-specific function that aggregates the data in the target data set based on the proximity area in which the data item falls.
  • the proximity analysis manager invokes the user-specific proximity aggregation function.
  • the proximity analysis manager 136 stores the results of the aggregation in a special table designed to hold the results of aggregation of proximity analysis data sets.
  • a proximity analysis manager retrieves metadata from the report metadata table for a report that generates user-specific reports form aggregated proximity analysis results.
  • the proximity analysis manager 136 creates a report using the saved proximity analysis aggregation data.
  • the proximity analysis manager displays the report to the user.
  • FIG. 48 illustrates an insurance solution flow in accordance with certain implementations of the invention.
  • setup is performed to set up events and landmarks, and (block 4812 ) configuration is performed.
  • Company A policy data and landmark data 4820 are stored in a generic insurance data store (block 4822 ).
  • PML calculation is performed. The PML calculation may interact with a risk manager 134 4814 , an underwriting system 132 4816 (labeled “underwriter”), and a reports component 4818 .
  • PML calculation is configurable. PML calculations are able to go across multiple layers (e.g., these may be multiple logical layers that correlate to physical layers). For example, proximity analysis may be performed that shows the combined analysis of prospects and total existing policies. These may be displayed to the user as two distinct layers. Additionally, PML calculation may be tied to events.
  • FIG. 49 illustrates a screen 4900 showing proximity analysis with rings at different distances from an epicenter in accordance with certain implementations of the invention.
  • a proximity image may be similar to the one illustrated in FIG. 49 .
  • fields used for the proximity summary may be different.
  • a financial services company wants to identify sales around their local sales offices and how many mailing pieces they need to produce to send to yield a certain increase in sales. The company knows that the return diminishes as the customer's location is further from the local office and it is proportional to last years' sales.
  • the proximity analysis manager 136 may be used by a financial services representative to select a customer data layer, choose an event as local mailer, and choose a specific local office under analysis.
  • a customer data layer may be described as a data layer that provides customer information, and there may be multiple customer data layers, each targeting customers in a different manner, where there may be either a different data type or there may be different temporal aspects to data layers.
  • the proximity analysis manager 136 returns a proximity summary that shows the total number of customers per ring and calculates a 60% return from Ring 1, 50% from Ring 2, 30% from Ring 3 and 10% from Ring 4.
  • a financial services company wishes to identify all customers who have not purchased a product in the last five years within 20 miles of their local office.
  • a financial services representative may perform a 20-mile proximity analysis on a customer locations data layer. Once selected, a full report may be used to further query the results on the last purchase date (e.g., going back 5 years). The representative may then view the limited results spatially (e.g., on a map) and print the report as well.
  • a financial services company wishes to identify all law firms within 20 miles of the branch office that employee 10 to 100 employees and that have no active retirement plan.
  • a financial services representative may perform a 20 mile proximity analysis on the a specified data layer.
  • the financial services representative may further select law firms with 10 to 100 employees.
  • An additional query may be submitted to refine the search to those with no active retirement plan.
  • the proximity analysis manager 136 is able to make use of stored procedures, outside models or provide simple proximity selection. Furthermore, the proximity analysis manager 136 is enabled as a Web service by the enterprise spatial system in certain implementations. Additionally, proximity summary options are configurable (e.g., include the ability to not include an event type or differential damage rates) in that they are configurable by company and configurable as user-defined and on-the-fly. Proximity analysis is available across security zones (e.g., point data types for center point and selections are still valid). The proximity analysis manager 136 supports multiple event types. Aggregation on-the-fly is supported (e.g., not having an Extract, Transformation, and Load (ETL) pre-aggregation does not prevent an analysis).
  • ETL Extract, Transformation, and Load
  • FIG. 50 illustrates a proximity analysis process 5000 in accordance with certain implementations of the invention.
  • data is input to a point buffer that outputs filtered data.
  • a point buffer may be described as an area around the point (e.g., if a city is a point, the point buffer may include cities around the point).
  • information that is pre-defined for a target data layer may be summed in a proximity analysis summary. That is, FIG. 50 illustrates the process for generating measurable data for the proximity summary and reports (both the summary and detail). This process is the precondition for drill down.
  • a simple proximity analysis may be performed that does not require applying a PML formula. In these cases, the filtered data may simply be aggregated.
  • generic proximity analysis refers to proximity analysis that is not event driven.
  • the proximity analysis manager 136 provides several techniques for selecting a center feature (e.g., a point, line or polygon) on a map for proximity analysis.
  • selection of a center feature may be by a search by options feature, from a selected point or by manually selecting an XY coordinate on the map.
  • the rule governing which selected or searched on point will be used is that the last selected single feature is used, irrespective of how it was selected.
  • FIG. 51 illustrates a proximity analysis screen 5100 in accordance with certain implantations of the invention.
  • the population of an initial proximity analysis screen is through the latitude/longitude option. Whatever search by or selection is made (e.g., a single point), the latitude and longitude is populated when the user chooses proximity analysis.
  • the address also pre-populates the initial proximity analysis screen in order for the user to verify the start point. If multiple points are selected, none are used to pre-populate the proximity analysis screen.
  • FIG. 52 illustrates manual point tools 5200 in accordance with certain implementations of the invention.
  • a user's mouse click may capture a latitude and longitude, and an “x” may mark the spot representing the selected point on the map.
  • the user may move the “x” by using the mouse, and the XY coordinates are updated in a status bar.
  • the tool tip for the “x” may be “Select lat/long”, while the caption text may be: “Click to select a latitude and longitude”.
  • FIG. 53 illustrates a screen 5300 showing a sample selection of an XY coordinate in accordance with certain implementations of the invention.
  • the proximity analysis manager 136 allows a proximity analysis with a project as it allows users to collaborate. This includes saving the center point, the proximity summary, and any drill down links to reports.
  • projects saved with one or more proximity analysis indicators turned on should open with these “layers” turned on. That is, a policy locations layer had been previously turned on for a project and the project were saved, then, the policy locations layer would be saved, and opening the saved project would make the policy locations layer available.
  • a project may be described as data associated with one or more tasks performed by a user.
  • the proximity analysis manager 136 performs generic proximity analysis that allows for an industry neutral option.
  • the generic proximity analysis may not include the landmark option.
  • proximity weights are optional (e.g., in lieu of weights the rings may be summed).
  • any type of calculations i.e., not just PML calculations) may be performed.
  • event type may not be defined.
  • FIG. 54 illustrates an initial proximity analysis screen 5400 for generic proximity analysis in accordance with certain implementations of the invention.
  • FIG. 55 illustrates a second proximity analysis screen 5500 for generic proximity analysis in accordance with certain implementations of the invention.
  • the center point may be defined by entering an address or by entering longitude and latitude values.
  • FIG. 56 illustrates a third proximity analysis screen 5600 for generic proximity analysis in accordance with certain implementations of the invention.
  • ring attributes may be defined.
  • maximum number of rings e.g., 12
  • a default number of rings e.g., 6
  • a maximum ring size e.g., 3 miles
  • the maximum ring size is not tied to layer scale.
  • the unit of measurement includes any available measurement options (e.g., feet, yards, miles, meters and kilometers). Since there is no event, the distances default to empty. Validation ensures that each ring is larger than the next
  • FIG. 57 illustrates a third proximity analysis screen 5700 with summary options for generic proximity analysis in accordance with certain implementations of the invention.
  • the ring options include choosing the label, symbol, and color for the center point and the ring.
  • the proximity summary may be populated with default values.
  • the proximity summary advanced option to choose custom fields for the summary is provided as an additional function.
  • a proximity analysis full report includes the proximity number and the distance to the center point, in addition to other report fields.
  • the distance category is configurable to whatever measurement unit is chosen (e.g., feet, meters, etc).
  • a proximity analysis point n′ view includes a proximity number and distance. Additional point n′ view fields are populated by the first five fields defined for generic point n′ view.
  • a point n′ view may be described as an information tool that provides attributes for a selected item (e.g., if a state is selected on a map, the state name may be selected).
  • FIG. 59 illustrates a screen 5900 provided by the proximity analysis manager 136 with a point n′ view report in accordance with certain implementations of the invention.
  • a generic proximity summary includes, for example, a sum of the values of the selected objects within each ring upon completion of a proximity analysis, as well as a total for all rings.
  • FIG. 60 illustrates a screen 6000 provided by the proximity analysis manager 136 with a proximity summary in accordance with certain implementations of the invention. There are a variety of points that have been selected. Instead of a simple summing of certain fields, the summary calculates values of points within the various rings. Certain implementations of the invention provide flexibility to allow different customers to have more or fewer fields summed, various calculations performed, averages, and/or counts.
  • FIG. 61A illustrates a table 6110 provided by the proximity analysis manager 136 of landmark proximity analysis totals in accordance with certain implementations of the invention FIG.
  • the proximity information may include: the ring number (1), the ring radius (2), and the total # of locations (3), with no data displayed for the total # of locations and any other fields.
  • the proximity analysis manager 136 supports a generic hand-off report button for selection and proximity summary and layer report.
  • the generic hand-off report button provides the user with the ability to link to the “Reporting” application services and display a report.
  • the button may also be configured to meet user needs in terms of the report generated.
  • FIG. 62 illustrates a proximity summary 6200 provided by the proximity analysis manager 136 in accordance with certain implementations of the invention.
  • the generic hand-off button is labeled “Details”.
  • the proximity analysis manager 136 also provides a generic details report.
  • the generic details report includes the fields in the proximity summary. Additionally, from the generic details report, selection of a link by a ring number displays details (e.g., each location within that ring).
  • FIG. 63 illustrates a screen 6300 of a details report in accordance with certain implementations of the invention.
  • Event driven proximity analysis makes use of modeling and business rules.
  • An event may be, for example, a terrorist attack or earthquake for an insurance company or an advertising campaign for a marketing organization. In either case, the user is calling upon an event that provides ring weights and in some cases black box calculations.
  • Black box calculations may be described as an abstraction of a device or system in which its externally visible behavior is considered and not its implementation or “inner workings”.
  • the proximity analysis manager 136 provides an event driven wizard in certain implementations.
  • the event driven wizard includes events as screen elements. For example, the events may be displayed in a drop down list and are data driven based on the events available to a role. There is an option to use no event (i.e., in effect making it a generic proximity analysis).
  • the proximity analysis accommodates the event driving landmark issues. Multiple event options are allowed. For example: maximum loss, earthquake, mailing, phone interviews, site selection, etc.
  • FIG. 64 illustrates an initial screen 6400 for an event driven wizard in accordance with certain implementations of the invention.
  • FIG. 65 illustrates a second screen 6400 for an event driven wizard that shows the addition of a landmark option in accordance with certain implementations of the invention.
  • the selection of a point layer is configurable, and the type of point layer that may be selected depends on the event previously selected.
  • FIG. 66 illustrates a third screen 6600 for an event driven wizard that is displayed when the Continue button is selected in FIG. 65 in accordance with certain implementations of the invention.
  • the proximity analysis manager 136 provides a full report, a point n view, a detail report, and a proximity summary for the event driven proximity analysis as for the generic proximity analysis.
  • FIG. 67 illustrates a proximity summary 6700 in accordance with certain implementations of the invention.
  • the proximity summary performs a PML calculation in this illustration.
  • the proximity summary may include values that are retrieved by calling out to an external program or a stored procedure.
  • the “PML” may be a value returned from a stored procedure that undertakes calculations (e.g., that are in the control of a client computer).
  • a temporary proximity analysis is displayed in the layer control, and is editable by clicking a name (e.g., a hyperlinked name). Saved proximity analysis is also editable in the same manner. In certain implementations, editing will bring up the proximity analysis wizard pre-populated with the stored information. In certain implementations, there are several proximity analysis roles or functions, including: a) create proximity analysis with temporary proximity analyses displayed in layer list and b) save & edit.
  • FIG. 68 illustrates a layer control 6800 provided by the proximity analysis in accordance with certain implementations of the invention.
  • a layer control enables the viewing of a data layer. For example, under proximity analysis, two layers are available for selection. When proximity analysis is selected (e.g., “turned on”) for a previously saved proximity analysis, the proximity analysis manager 136 takes the user to a screen displaying the saved proximity analysis.
  • FIG. 69 illustrates proximity analysis menus 6900 in accordance with certain implementations of the invention.
  • the menus include Create, Edit, and Delete proximity analysis.
  • proximity analysis may be initiated using a button on the tool bar or the Create proximity analysis menu.
  • There are two ways to edit proximity analysis that are in the layer list 1) from a hyperlinked name or 2) from the Edit proximity analysis menu. For example, if the user clicks on a hyperlinked name, the proximity analysis wizard appears pre-populated, while if the user chooses the “Edit” proximity analysis menu, a screen for selecting the proximity analysis is presented that then leads to a pre-populated wizard.
  • FIG. 70 illustrates a screen 7000 provided by the proximity analysis manager 136 to allow selection of a proximity analysis for editing in accordance with certain implementations of the invention.
  • the proximity analysis may be deleted by choosing the “Delete” proximity analysis menu.
  • a screen for selecting the proximity analysis for deletion may be provided to delete individual or multiple proximity analyses from the layer list.
  • Temporary proximity analyses may be deleted when projects are closed or new projects are opened.
  • FIGS. 71A and 71B illustrate screens 7100 and 7120 , respectively, provided by the proximity analysis manager 136 to allow deletion of a proximity analysis for editing in accordance with certain implementations of the invention.
  • the proximity analysis manager 136 saves all or certain parts of the proximity analysis that is selected for saving. This includes, but is not limited to, the target layer, the center point, the number of rings, the distance of the rings, any weighting or black box calculations, proximity summary and reports, as well as options (ring color etc). In certain implementations, two types of proximity analysis may be saved (e.g., one that includes the center point and one that does not).
  • proximity analysis layers are displayed in the list control. Saved proximity analyses may appear with the name given at time of saving as specified by the user.
  • proximity analysis layers that may be edited are hyperlinked for editing or saving.
  • Saved proximity analysis and temporary proximity analysis created by a user with the save role may be edited and saved. Users with a save role may “save as” any corporately saved proximity analysis. Users without the save role may edit their own temporary proximity analysis.
  • Temporary proximity analysis will save with a concatenated name followed by an asterisk.
  • the temporary proximity analyses may be turned on or off like standard layers in the layer control.
  • Temporary layers may be discarded if a user with a non-save role exits, opens a new project or chooses “New” project. The user is prompted with a popup dialog with “Information”, “You have temporary Proximity analysis layers which will be discarded,” and the user may select whether or not to allow the layers to be discarded.
  • Temporary layers are discarded if a user with a save role exits, opens a new project or chooses “New” project.
  • the user will be prompted with a pop-up dialog with “Information”, “You have temporary Proximity analysis layers which will be discarded”; “Click OK to discard temporary Proximity analysis layers and continue, or click Cancel to return and save any temporary Proximity analysis layers.” The user then makes a selection.
  • FIG. 72 illustrates a screen 7200 provided by the proximity analysis manager 136 to save a proximity analysis in accordance with certain implementations of the invention.
  • a user selects one or more proximity analyses to save and selects a sharing and access option, such as do not share, provide limited access or provide fill access.
  • FIG. 73 illustrates a screen 7300 provided by the proximity analysis manager 136 that allows selection of users for assigning access privileges when an access option is selected in FIG. 72 in accordance with certain implementations of the invention.
  • the user may be prompted to determine whether the file should be saved over. If the name chosen by the user already exists and the user does not have right to save over the file, the user may be prompted to save with a different file name.
  • the proximity analysis manager 136 is also able to perform analysis based on multiple event types (e.g., dirty bomb, truck bomb, chemical attack, earthquake epicenter, earthquake fault line, etc.). For example, the proximity analysis manager 136 performs natural catastrophe analysis that may involve multiple events.
  • event types e.g., dirty bomb, truck bomb, chemical attack, earthquake epicenter, earthquake fault line, etc.
  • the proximity analysis manager 136 performs natural catastrophe analysis that may involve multiple events.
  • a user is provided with the option of combining the two proximity analyses, displaying the two separately, or replacing the current one with the new one. If the user chooses display separately, both proximity analyses appear on the map and two distinct proximity summaries and details are displayed. If the user chooses combine, the map displays both proximity analyses, and, if both proximity analysis use the same target layer, the proximity summary details are combined.
  • a save to layer or save landmark option is provided by the proximity analysis manager 136 to add new point features to an existing data layer.
  • the requirements for any customer specific options are maintained while providing functionality at the event driven proximity analysis level.
  • the layers available for this feature are editable.
  • the newly added landmarks may be incorporated into the landmark layer once the ETL process has been completed.
  • the Save to Layer process starts when an address or latitude/longitude is provided as input in the wizard (either directly or through search by) by a user with a role that allows the user save to layer.
  • a user selects the Save To layer button, selects a layer to save to, and inputs layer name, location, and attribute information.
  • FIG. 74 illustrates a screen 7400 provided by the proximity analysis manager 136 for Saving To a layer in accordance with certain implementations of the invention.
  • FIG. 75 illustrates a screen 7500 provided by the proximity analysis manager 136 for inputting information for the Save To option in accordance with certain implementations of the invention.
  • the layer attribute information is data driven to provide flexibility and scalability.
  • a proximity summary has the following defaults for an insurance company: number of locations, exposure, ground up loss, total premiums, and PML. Also, insurance customers establish their Event Setup information such as default proximity details, damage rates and PML rating table via UIs provided by the proximity analysis manager 136 .
  • FIG. 76 illustrates proximity analysis for an insurance industry scenario in accordance with certain implementations of the invention.
  • Ring analysis 7610 is started by selecting a landmark ( 7602 ), selecting policy data with rings ( 7604 ) or selecting an event type ( 7606 ).
  • the output of ring analysis 7610 is a filtered set 7612 that is used for a map display 7614 .
  • ring analysis 7610 leads to generating PML and aggregate measured data elements ( 7616 ) using the filtered set 7612 .
  • the output of the generation of PML and aggregate measured data elements 7616 is a ring summary 7620 and drill down reports 7622 .
  • a starting point for ring analysis may be selected via a customer specific technique, an address, an intersection, a latitude/longitude, manually, or from a data layer.
  • the PML may be generated with a system defined formula or a customer specific formula
  • FIG. 77 illustrates customer specific inputs for a formula 7700 for generating PML in accordance with certain implementations of the invention.
  • the PML formula starts with Total Insured Value (TIV, also known as exposure) and Damage Rate. Damage rate is affected by event type proximity to the event and may range from 0% to 100% (i.e., damages may range from none at all to a total or maximum loss).
  • TIV Total Insured Value
  • Damage Rate is affected by event type proximity to the event and may range from 0% to 100% (i.e., damages may range from none at all to a total or maximum loss).
  • the event type and proximity to the event may be selected by a user.
  • FIG. 78 illustrates a center point 7800 and a selected point 7810 for which a policy may be issued in accordance with certain implementations of the invention.
  • the proximity to the event factor may be selected by the user per event type to include a value that is stepped, linear or logarithmic. Stepped refers to allowing damage rates to change from proximity to proximity.
  • a damage rate table shows the damage rate per proximity.
  • FIG. 79A illustrates a stepped relationship 7900 in accordance with certain implementations of the invention. As for linear, when two variables are linearly related, the points of a scatter plot fall on a straight line.
  • FIG. 79B illustrates a linear relationship 7920 in accordance with certain implementations of the invention. For a linear relationship, start and end points are selected, and the formula 1/r is used to form the line (where “r” is radius).
  • FIG. 79C illustrates a logarithmic relationship 7940 in accordance with certain implementations of the invention.
  • FIG. 77 the TIV times the Damage Rate results in a Ground Up Loss.
  • the Ground Up Loss times a Net After Catastrophe (NAC) results in PML.
  • the NAC is a calculation that incorporates information from policy data, including, for example, a deductible, treaties, and reinsurance.
  • FIG. 80 illustrates a NAC structure 8000 that is used to determine a NAC in accordance with certain implementations of the invention.
  • the proximity analysis provides rating for insurance scenarios.
  • a simple rating may be described as a ratio of aggregate PML to CAP.
  • a rating may be partially dependent on the event type.
  • rating is applied to landmarks through the ETL process.
  • the rating for a new policy is determined by finding the highest landmark rating with a specified distance (e.g., the maximum proximity for a building collapse).
  • FIG. 81 illustrates a rating process in accordance with certain implementations of the invention.
  • Landmark data 8102 is input to a point buffer 8104 that applies a filter to the landmark data 8102 .
  • the output of the filtering is filtered data 8106 , to which a rating formula is applied 8108 .
  • the result of applying the rating formula 8108 is a rating for a location.
  • FIG. 82 illustrates metadata used to implement ring analysis in accordance with certain implementations of the invention.
  • the metadata includes a MD_LayerDefinition table 8202 , a MD_ServiceLayer 8204 , and a MD_service table 8204 .
  • the data includes a LD_Landmark table 8222 , a VW_Landmark Ring table 8224 , a Session_Landmark Ring table 8226 , and a LD_Policy Location — 1 — 0 table 8228 .
  • the insurance company landmark layer may be made part of the Ring_Landmark service.
  • a Ring_Landmark_service may be described as a grouping of data layers and associated rules to present data to a client.
  • the client retrieves the landmark layer identifier by, for example, a Get_Service_Info call on the Ring_Landmark service.
  • the Ring_Landmark service performs a get feature on the landmark layer to get the landmark names and identifiers to populate the landmark name dropdown in the UI.
  • the ring analysis target is a view called VW_Landmark_Ring, rather than a data layer.
  • the VW_Landmark_Ring table 8224 represents a view created by joining the LD_Policy_Location — 10 table 8228 with the Session_Landmark_Ring table 8226 .
  • the Session_Landmark_Ring table 8226 may be viewed as a per session temporary table to hold the results of ring analysis.
  • the client may retrieve the layer id of the VW_Landmark_Ring layer and then work with the VW_Landmark_Ring layer as though it were a ring analysis target layer (i.e., a policy location layer).
  • An event type drop down that allows a user to select an event type may be populated by JSP page doing a Get_Event_Type function call.
  • a Get_Event_Type function is a function that retrieves from a data store a list of events available for a client. This function pulls the event type name and ring dimensions for the event types from the insurance company schema.
  • the policy location table (e.g., 8228 ) is one physical table that is separated into different logical layers based on data load batch number.
  • the policy data for different months are identified by a batch number column rather than by a date that may be present in several tables in the customer's schema that contains data for more than one month.
  • the usage of batch numbers ties the ring analysis logic into the Extract, Transformation, and Load (ETL) periodic load process.
  • the ring analysis is performed by four different requests to the ESS server from the client computer.
  • First the client computer sends the Generate Rings request with the options chosen by the user in the ring analysis wizard.
  • the ESS server calls a stored procedure that does a spatial ring analysis and deposits the results of the analysis in the Session_Landmark_Ring table 8226 keyed by the sessionid of the current session.
  • the client computer then does a Get_Features call to get a list of FIDS, which are unique identifiers that identify each individual item in a data set, followed by a Get_Image call on the ring analysis target layer (which in this case is the VW_Landmark_Ring table 8224 ).
  • the client computer After displaying the ring image, the client computer calls the Generate Ring Summary call, which causes the ESS server to call an insurance company specific stored procedure to generate the data for the aggregate tables and PML calculations used for analysis summary and drill downs.
  • the ring analysis target layer is set up with a system filter on sessionid. Therefore, the features generated by the last generate ring stored procedure call may be retrieved and rendered.
  • the client computer then makes the fourth request to the ESS server to generate the analysis summary.
  • the ESS server calls retrieves the analysis summary from the aggregate tables and returns the analysis summary to the client computer.
  • the generic ring analysis architecture does not use predefined views that join non-spatial ring analysis results with spatial policy location data. Additionally, the generic ring analysis architecture may handle any customer with minimal customization.
  • FIG. 83 illustrates metadata to support proximity analysis functionality for a customer in the insurance business in accordance with certain implementations of the invention.
  • the metadata may vary for different customers in other lines of businesses and may vary for different customers in the insurance business.
  • the metadata includes a MD_LayerDefinition table 8302 , a MD_ServiceLayer table 8304 , a MD_ResourceHierarchy table 8306 , a MD_Service table 8308 , and a MD_ExternalLayerData table 8310 .
  • the data includes a LD_Landmark table 8320 , a VW_Events — 1 — 0 table 8322 , a WS_Policy_Location table 8324 , a Policy_Session_Ring_AGG table 8326 , and a LD_Policy_Location — 1 — 0 table 8328 .
  • FIG. 83 there is no predefined view that joins the temporary session based landmark ring table with the policy location table.
  • Each layer in the MD_LayerDefinition table that is a proximity analysis target is made part of the Ring service (Ring service is a grouping of data layers and the associated rules for presentation of the data to the client).
  • the results of a generate ring call go into a WS_Policy_Location table 8324 .
  • Each one of these layers also has an associated temporary table into which proximity analysis aggregates are deposited.
  • the proximity target layer is associated with the WS_Policy_Location table 8324 through an entry in the MD_ResourceHierarchy table 8306 .
  • the client computer When the client computer does a Get_Service_Info on the Ring service, the actual proximity target layer identifiers are returned.
  • the client computer makes three additional requests to display the proximity and the proximity summary, but the call to generate the proximity image is via a new ESS server request instead of via a generic Get_Image request.
  • the client computer makes a Get_Workingset_Image request on the target layer identifier.
  • the ESS server retrieves the associated WS_Policy_Location table 8324 and sends the layer source data for the WS_Policy_location table 8324 along with the layer source data for the proximity target layer in the form of a JOINTABLE clause to a map server provided by implementations of the invention.
  • the map server renders the features from the LD_Policy_Location — 1 — 0 table 8328 , for which there is a corresponding entry in the WS_Policy_Location table 8324 .
  • Events and their associated attributes may be defined in an industry specific, customer specific schema. In the case of insurance customers, these attributes are resident in the GI_Peril, GI_Event and GI_EventZone tables of the Generic Insurance schema.
  • each industry segment to which the analysis manager is applied works with an industry specific schema.
  • the industry specific schemas include event definitions, the attributes of the events may vary, but there are a set of core attributes that apply to the events that the analysis manager uses. These attributes include, for example, Event Name, Event Id, Event Zone Number, Event Zone Radius and Units of Distance.
  • Event Name e.g., Event Name
  • Event Id e.g., Event Id
  • Event Zone Number e.g., Event Zone Number
  • Event Zone Radius e.g., Event Zone Radius
  • An MD_Layersource table is a metadata table that is used to associate a metadata definition for a data layer in the MD_LayerDefinition table with a physical database table in a schema that contains the actual data for the data layer.
  • the MD_LayerDefinition entry is used to retrieve the event related attributes.
  • the analysis manager associates specific events with specific layers and specific functions in an enterprise spatial system (ESS) schema.
  • Events are customer specific data records in a customer schema, and the association to the ESS schema resource entries uses a technique by which the external data elements may be referenced.
  • the function of a UM_ElementType table and a UM_Element table is to allow references to customer specific data elements, so these two tables are leveraged to identify individual events in the ESS schema.
  • Each entry in the UM_ElementType table has associated with it one or more entries in the UM_Element table.
  • the UM_ElementType table includes at a minimum two columns, ElementTypeName and ElementTypeID.
  • the UM_Element table includes four columns: ElementID, ElementType, ElementValue and ExternalElementId.
  • the UM_ElementType table includes an entry whose ElementTypeName is “Event” and ElementTypeID is 10. This entry has associated with it two entries in the UM_Element table. For example, the first entry has an ElementID of 200, ElementTypeID of 10, ElementValue of “Earthquake” and ExternalElementID of 5000. In this example, the second entry has an ElementID of 300, ElementTypeID of 10, ElementValue of “Hurricane” and ExternalElementID of 6000.
  • the value 10 in the ElementTypeID column in the UM_Element table associates these two entries with the corresponding entry in the UM_ElementType table.
  • the value of 5000 and 6000 in the ExternalElementID column refers to identifiers in some table in the ESS schema that will be used to retrieve the attributes associated with these two events.
  • the values of 200 and 300 in the ElementID column are unique identifiers for the UM_Element table entries.
  • the MD_LayerDefinition table 8302 entry for the event view has a predefined field called “Event_Ref”. This field has a “Field_Type” value of “Event”.
  • the Element_Type_ID for this field refers to an entry in the UM_ElementType table.
  • This element type table entry belongs to the same company that owns the event definition in the customer specific schema.
  • This element type table entry has element values in the UM_Element table that correspond to each event defined in the customer's schema.
  • the “Value” field in the UM_Element table has the event identifier, and the “Description” field has the event name.
  • the event identifier in the “Value” field is used to retrieve the event attributes from the event view provided on the customer's schema.
  • the MD_Resource table is a parent table to the MD_LayerDefinition table.
  • the MD_Resource table contains a ResourceID column.
  • the LayerId column value in the MD_LayerDefinition table 8302 will match the value in the ResourceID column in the MD_Resource table.
  • UM_ElementResource table includes at a minimum two columns: a ResourceID column and a ElementID column.
  • an entry appears in the UM_ElementResource table with a value of 10 in the ResourceID column and a value of 200 in the ElementID column, it means the event EarthQuake (from the example in discussed with reference to the UM_ElementType table and UM_Element table above) is associated with the layer named “Policies” with a LayerId of 10 in MD_LayerDefinition table 8302 .
  • the UM_Element_resource table provides an association table between the UM_Element table and the MD_Resource table.
  • the UM_ElementResource table has a field called Association_Type, just as in the MD_ResourceHierarchy table.
  • the UM_ElementResource table is used to associate specific events with proximity analysis target layers and source layers in the MD_LayerDefinition table.
  • the UM_ElementResource table is also used to associate events with event specific stored procedures defined as functions in the MD_Function table.
  • the analysis manager uses these associations to restrict the choice of events and source layers based on the user's selections in the proximity analysis wizard.
  • the event set up tool enables population of the UM_Element table and the UM_ElementResource table in the ESS schema and enables populating the event related tables in the customer's own schema.
  • Custom Events may be associated with specific custom functions defined in the MD_Function table using the UM_ElementResource table.
  • Custom functions specific to proximity analysis have a function category value of “Proximity_Analysis”. If the function type for these functions is “Stored_Proc”, the function name is passed as a string parameter to the Create_Ring_Aggregates stored procedure.
  • the Create_Ring_Aggregates stored procedure uses the custom function name to invoke the appropriate custom stored procedure. That is, the Create_Ring_Aggregates stored procedure may be pre-wired with a known function signature for the custom function.
  • the analysis manager offers many complex functions. Thus, the results of one operation may be stored for future use by another request from the client computer. As data sets get larger, sending the interim data to the client computer to be returned by the client computer on the next ESS server request is to be avoided.
  • the analysis manager uses the concept of working set tables to accomplish this.
  • a working set table is a table that contains the results of a ESS server operation.
  • a working set table contains a set of features that were retrieved or identified as part of an operation.
  • the records in the working set are grouped together by the use of, for example, a handle. All the records that are part of the same working set have the same handle value in the “handle” column in the working set table.
  • the working set tables are named with a WS_prefix.
  • a working set table has at least two columns. The at least two columns are “Handle” and “Id”.
  • the “Handle” column contains a handle value that is used to group working set records within the table. Handles are unique values that are generated for each operation that creates a working set. Handles are managed using a handle table in the ESS schema.
  • the “Id” column contains a unique identifier that identifies the records in the original table from which the working set is derived. For example, if a selection operation generates a working set of feature records from a spatial layer, the “Id” column may contain an alternate key identification (AKID) values for the features selected.
  • An AKID may be described as a column or set of columns used to uniquely identify a row in a table.
  • the working set table may include additional, optional columns that vary by the usage of the working set table.
  • a working set table used to hold a set of selected features may not have any optional columns, but a working set table used for proximity analysis may contain a “RingId”, “PML” and “Distance from Landmark” as columns.
  • Each schema (i.e., the ESS schema and the customer specific schema) also has a global working set table.
  • the global working set table has the name WS_ ⁇ CompanyName>.
  • the ESS schema has a working set table called WS_QT.
  • An insurance company may have the global working set table called WS_insurance_company in the insurance company schema.
  • the global working set table contains a minimal set of columns that are relevant across multiple source tables within a schema.
  • layers may have associated working set tables set up to handle special functions.
  • a policy location table may have an associated working set table called WS_Policy_Location. This table may have additional columns used for proximity analysis.
  • the layer specific working set tables are associated with the layers through the MD_Resource_Hierarchy table with an Association_Type value of “Working_Set”.
  • the layer specific working set table for a layer may reside in the schema in which the layer data is resident, while in alternative implementations, the layer specific working set table may reside elsewhere.
  • Working set tables may be used to bridge data in disparate schemas in different locations. For example, the working set table may reside on a schema different from the source layer based on the intended use of the working set.
  • FIG. 84 illustrates a sample handle table 8400 in accordance with certain implementations of the invention.
  • the LogicalHandle Field is the handle used by the client computer. In certain implementations, the logical handle is the same as the physical handle.
  • the PhysicalHandle Field is an actual handle value that appears in the working set table.
  • the separation of logical and physical handles allows more that one working set table to be associated with a logical handle.
  • the separation of logical and physical handles also allows an external system or schema to generate handles using its own business rules.
  • the WorkingSetType Field identifies whether the working set table this handle applies to is a global working set table or the layer specific working set table.
  • the possible values for the WorkingSetType field are “Global” and “Layer”.
  • the SessionId Field provides a Session Identifier of the session that created the handle and is used to validate handles before the handles are used.
  • the HandleStatus Field is used to garbage collect discarded data in working set tables, and possible values for this field are “Active” and “Obsolete”.
  • the LayerId Field identifies the source layer from which the data in the working set table is generated. If the WorkingSetType is “Global” this field is used to identify the schema in which the global working set table is resident. If the WorkingSetType is “Layer”, the working set table is identified using the MD_ResourceHierarchy working set entry associated with this layer id. In certain implementations, the working set table may be explicitly named in the handle table.
  • the Function Field specifies a function for which the data in the working set is created and may be used for tracking purposes.
  • the CreationTime Field identifies the time at which the handle was created.
  • Generic functions for proximity analysis are Create_Rings, Create_Ring_Aggregates, Ring_Summary and Get_WorkingSet_Image.
  • the Create Rings Function is declared as a function in the MD_Function table. The following are the attributes of the MD_Function table entry for a Create Rings function: Function_Type: Stored_Proc;
  • Function_Category Internal; Generic_Name: Create_Rings; Display_Name: Create Rings for company; and, Operational_Template: Create_Session_Landmark_Ring. The remaining fields may be null.
  • the Create Rings function is a function whose method parameter signature is known to the analysis manager.
  • the Operational_Template in the MD_Function table is the stored procedure name.
  • the Create Ring Aggregates function creates the aggregate tables and possible PML calculations.
  • the Create Ring Aggregate function may be a stored procedure that is passed the field information for the fields that are associated with this function in the MD_FunctionLayerField table.
  • a proximity summary function is used to retrieve and display a proximity summary.
  • Function_Category Internal; Generic_Name: RingSumary; Display_Name: Ring Summary for company, and Operational_Template: company Ring_Summary Report.
  • the remaining fields may be null.
  • the ESS server finds the report name from the Operational_Template and forwards the request on to the report ESS server along with the field information associated with the RingSummary function.
  • the Get_WorkingSet_Image function may be a special case of the generic Get Image function that renders the features in the working set.
  • the following is sample Extensible Markup Language (XML) for the client computer to the ESS server request.
  • XML Extensible Markup Language
  • ⁇ LAYERDEF id “Rings”
  • the ESS server identifies the working set table associated with the handle and calls the map server to render the working set features.
  • the map server is updated to accept working set tables in addition to the usual parameters for a render request for an image. This may be accomplished using a “JOINTABLE” structure, which is a structure used to merge the data from two or more database tables.
  • the map server is updated to accept the working set for the features being rendered for render requests.
  • the map server renders those features that are included in the list of records for the given handle in the working set table.
  • Certain data usage requirements require customer's data from different periods to be stored in the same physical table with a column that groups the data together.
  • One such example is the concept of batch numbers for company data.
  • the batch number is an artifact of the way data is stored in the tables.
  • the analysis manager may not be aware of this.
  • the ESS server has to call a stored procedure on the customer's schema
  • the set of data that is identified on the ESS side with a layer identifier is actually identified by the batch number in the customer's schema.
  • the data may be identified by more than one dimension in the customer's schema.
  • MD_ExternalLayerData is added to the ESS schema.
  • This table contains a set of name value pairs for the resource identifier corresponding to a layer. Any time a stored procedure is called in the ESS schema, in which this layer resides, the set of name value pairs from this table is passed as a variable array parameter to the stored procedure. For example, the batch number corresponding to a layer appears in the MD_ExternalLayerData table as a name value pair for the attribute “Batch”. This allows the ESS server to pass the batch number corresponding to a layer to the stored procedure without the ESS server having any knowledge of batch numbers. Additionally, the MD_ExternalLayerData table is populated with the right set of attributes when this layer metadata/data is loaded.
  • FIG. 86 illustrates a sequence diagram 8600 that describes the client computer and ESS server interaction for proximity image/proximity summary generation in accordance with certain implementations of the invention.
  • the client computer submits requests to the ESS server.
  • An analysis manager at the ESS server submits requests to the ESS schema and/or the customer schema, receives data, and returns data to the client computer.
  • the ESS server, the ESS schema, and the customer schema may access other functions or tables for their processing.
  • a proximity point n′ view includes two additional fields displayed in addition to the normal point n′ view fields.
  • the fields are the proximity in which the feature lies and the distance from the occurrence of the event. These fields are added as virtual fields to the proximity target layers with a FIELD_TYPE value of “Proximity”.
  • the MD_LAYERFIELDDATA table has an entry for each of these fields that point at the proximity working set table as the redirect table.
  • the two new fields may be designated as point n′ view fields and/or full report fields.
  • the Get_Service_Info command returns the Field_Type value to the client computer.
  • the client computer uses this Field_Type value to decide whether to ask for a field for the point n′ view Get_Features.
  • the query builder logic in the ESS server looks at the field type value of “Proximity” to direct the query at the redirect table (i.e., the proximity working set table) to retrieve the values for the two extra field values.
  • proximity point n′ view The same logic as in proximity point n′ view will be used to retrieve the data for the proximity number and the distance from the occurrence of the event in addition to the normal full report fields for a proximity full report.
  • a proximity detail report is defined as a function in the MD_Function table and is associated with a report in the MD_Report table. This report information is returned as part of the layer information returned in the Get Service Info call. The client computer uses this information to do a Detail Report handoff from the client computer.
  • a proximity analysis summary may be provided that includes the total number of data points that fall within each proximity zone and/or a summation of one or more specific attribute values from these data points. The summary may also include the total number of data points that fall across all the proximity zones and/or the summation of specific attribute values from these data points.
  • a risk manager is provided as a risk manager application service
  • an underwriting system is provided as an underwriting application service.
  • an additional data application service provides risk manager administrator and home office business manager mapping, analysis, and reporting functionality.
  • the underwriter application service provides underwriter new business inquiry landmark search functionality.
  • the additional data application service provides data source administrator functionality for adding policy location information to policy data and validating data using a landmark search.
  • the reporting application service provides policy data non-spatial reporting functionality.
  • the administration application service provides administration functionality for risk manager administrators to manage users, roles, landmarks, and supporting maintenance tables.
  • the portal menu application service provides portal interface functionality integrated with a site minder system and controls access to other services.
  • reference data services enable procurement, processing, staging, and hosting of standard reference data received from data vendors.
  • Business data (e.g., Dun and Bradstreet data) services enable processing, staging and hosting of business data received from a customer (e.g., via a client computer).
  • Policy data services include processing, staging, hosting, and scorecard reporting of policy data received from a customer (e.g., via a client computer).
  • the following infrastructure services are provided: data center network connection, secure data facility, application service hosting, data storage, data integrity and security, and hot backup site.
  • the data center network connection services support specifications, leased lines, access and integration between the client computer data center and the enterprise spatial system secure data facility.
  • the secure data facility services support operation and maintenance of the secure data facility that hosts services provided by implementations of the invention.
  • the application service hosting services support operation and maintenance of the highly available, scalable multi-tier server system that hosts services provided by implementations of the invention.
  • a tier may be described as a group of computers performing the same type of service in a distributing computing environment.
  • the 3-tier application model is a common way of organizing a program in a network. N-Tier applications (programs) are those that are tiered, but the number of tiers isn't specified or may vary.
  • the data storage services support operation and maintenance of the on-line, near-line and off-line data storage systems that host the enterprise storage system data.
  • the data integrity and security services support operation and maintenance of the security, backup, and recovery processes, to avoid loss or compromise of business data.
  • the hot backup site services support operation and maintenance of the enterprise spatial system secure data facility hot backup site that ensures timely reestablishment of services provided by implementations of the invention in the event of catastrophic failure at enterprise spatial system secure data facility.
  • client services are provided: support, help desk, and training.
  • the services provided by implementations of the invention are offered to customers as subscription services (i.e., customers select services and pay for the selected services).
  • the subscription services may be used, for example, by risk manager administrators as well as individuals in the enterprise underwriting community. For ease of reference, these may be referred to as the ESS system service.
  • the ESS system service supports corporate underwriting programs and corporate control programs addressing terrorism.
  • the ESS system provides enterprise data and summary reports for potential terrorism exposures throughout the U.S. based on street-level risk information and enables the assessment of exposure and Probable Maximum Loss (PML) at selected high-risk locations. This information may be made available to all levels of the business community.
  • PML Probable Maximum Loss
  • Probable Maximum Loss may be described as the amount of loss expected based on the total liability underwritten for a specific area multiplied by a damage rate expected. A damage percentage rate is assigned to each geo-zone ring. Policies in that ring are totaled and then the damage rate is applied to determine the PML.
  • the application services may be used to analyze and manage a data value called Probable Maximum Loss (PML),
  • the PML value may be described as the amount of the underwritten liability for a given policy location that is at risk for loss in the event that a landmark, within proximity to that policy location, is destroyed or damaged due to a man-made disaster.
  • the PML value may be calculated for a given policy location base of the type of event that occurs at the landmark.
  • PML may be pre-calculated for each policy location.
  • each landmark is checked using a ring analysis process.
  • the ring analysis results indicate the total or aggregate PML of the policy locations within proximity of the landmark as specified by the “total loss” event type ring dimensions.
  • the landmark is assigned a landmark PML rating and risk code. The rating and code are then used by the underwriters, business managers and corporate risk managers to control overall (total book of business) and policy-by-policy (policy detail) risk incurred by policy underwriting in relation to the potential for loss due to any type of disaster (e.g., a man made disaster).
  • the PML value is a calculation that is based on the underwritten liability for each coverage type that the insurance company insures against a particular policy location. There are many factors that influence the PML formula, but these factors may be encapsulated in one or more stored procedures and supporting data provided to, and hosted by, the enterprise spatial system in order to generate the PML values. These PML values are generated during ETL for landmarks periodically (e.g., once a month). A second set of PML procedures are used to allow users of the risk manager application service to generate PML values in an ad hoc fashion.
  • the ad hoc process includes performing ring analysis on a single landmark location, and associated policy locations, where one or more of the ring analysis parameters are different from the periodic (e.g., monthly) ETL process.
  • FIG. 87 illustrates an ESS system service context diagram 8700 in accordance with certain implementations of the invention.
  • the diagram 8700 depicts the data components and processing steps provided to deliver the ESS system service.
  • the facilities provided by the ESS system service include the following: business groups, outside data sources, secure hosting services, and business users.
  • Business policy data sources are collected from business groups, and this policy data, aggregated and formatted, is the enterprise data source that is used by the ESS system service.
  • Business policy data is cross-referenced and correlated against outside data sources to add policy location and spatial relevance to prepare the data for use in the ESS system service.
  • ESS system services are made up of application, data, and infrastructure services that are employed in the transformation, secure hosting and delivery of policy data, vendor reference data. and system functionality to business users.
  • Business users include personnel involved in the administration, management, analysis and reporting use of the ESS system service functionality. This includes both home office (e.g., headquarters) and remote regional users in risk management and underwriting that have a need to interact with
  • provisioning of the component functionality for the ESS system service is divided between the client computer and the enterprise spatial system.
  • the client e.g., customer who purchases subscription services
  • Business data includes acquisition of policy data (e.g., collection of policy data provided from various business groups for provisioning into the ESS system service), a policy data formatting process (e.g., aggregation, cleanup, formatting and validation of policy data prior to delivery to the enterprise spatial system (e.g., as a single data object)); and period (e.g., monthly) upload of formatted policy data (e.g., encryption and provisioning of formatted policy data to the secure data facility over, for example, secure File Transfer Protocol (FTP) on a periodic basis.
  • FTP secure File Transfer Protocol
  • the vendor reference data includes acquisition of business data (e.g., license and media procurement from business data sources and provisioning to the enterprise spatial system).
  • Infrastructure includes an authentication system (e.g., specifications, access and integration with the client's authentication system), and a data center network connection (e.g., specifications, leased lines, access and integration between the client's data center and enterprise spatial system's secure data facility).
  • the enterprise spatial system provides the subscription services, including application services (the risk manager application service, the underwriter application service, the additional data application service, the reporting application service, the administration application service, and the portal menu application service), data services (reference data and policy data); and infrastructure services.
  • the infrastructure services include data center network connection services (e.g., specifications, leased lines, access and integration between the client's data center and enterprise spatial system's secure data facility), secure data facility services (e.g., operation and maintenance of enterprise spatial system's secure data facility that hosts the ESS system services); application service hosting services (e.g., operation and maintenance of the highly available, scalable multi-tier server system that hosts the ESS system services); data storage services (e.g., operation and maintenance of the on-line, near-line and off-line data storage systems that host the ESS system service's data); data integrity and security services (e.g., operation and maintenance of the security, backup and recovery processes ensuring no loss or compromise of critical business data); and, hot backup site services (e.g., operation and
  • client services such as premium support (e.g., providing resources from account and product management, strategic architecture design, network operations and client support), help desk (e.g., providing 24/7 availability of telephone based application and technical support); and training (e.g., providing a comprehensive train the trainer program) are provided to clients of the ESS service system.
  • premium support e.g., providing resources from account and product management, strategic architecture design, network operations and client support
  • help desk e.g., providing 24/7 availability of telephone based application and technical support
  • training e.g., providing a comprehensive train the trainer program
  • the enterprise spatial system is used to manage policy risk exposure to man-made catastrophes, such as terrorist attacks. Exposure may be managed by imposing landmark-based CAP limits on underwriters' and agents' ability to write and renew policies. There may be different users of the ESS system service. These users each play a role in the overall business processes of insurance underwriting, but are not all directly granted access to the system.
  • An executive has no system access, but is provided high level information.
  • a risk manager administrator may access system reporting and interactive mapping, and some may be granted setup/administrative functions.
  • a home office business manager accesses summary and detailed reports the for business manager's division.
  • An actuarial accesses summary reports across divisions and detailed reports for the actuarial's division.
  • a regional manager/director e.g., of an underwriter accesses summary reports across all divisions and detailed reports by division and/or region.
  • An underwriter accesses summary reports and new policy approval information for the underwriter's division and requests policy approval.
  • An agent has no system access, but may submit new policy requests to the underwriter and then is notified of approval/denial of the policy requests.
  • the risk manager administrators and home office business managers use the interactive mapping functionality of the risk manager application service.
  • FIG. 88 illustrates a new business approval process 8800 in accordance with certain implementations of the invention.
  • the new business approval process allows users to provide information regarding a new named insured.
  • the process controls the evaluation and determination of which new business policies may be written.
  • An underwriter checks the named insured information provided by the agent to verify if the policy was not within a landmark geo-zone.
  • a geo-zone may be described as an entire area considered within a distance around a landmark that may result in some damages for which claims may be made under an insured policy.
  • a geo-zone may be described as either an address or a spatially defined area such as city, county, or state. If the policy were in an acceptable zone (e.g., a green zone), the underwriter would be allowed to write the policy.
  • a green zone may be described as an address location of a policy that falls outside of all specified landmark geo-zones and for which PML is zero. If the policy is identified as being in a red or yellow zone (within a landmark geo-zone regardless of current CAP), then the underwriter would have to work with the home office business managers and the risk management group to evaluate if the policy was possible to underwrite.
  • a red zone may be described as an address location of a policy that falls within a specified landmark geo-zone, and the PML of the total policy liability for that coverage type and business unit is at or above the allocated CAP.
  • a yellow zone may be described as an address location of a policy that falls within a specified landmark geo-zone and the PML of the total policy liability for that coverage type and business unit below the allocated CAP.
  • the home office and/or risk management group would do “what if” scenarios by entering in coverage, premium, number of employees, and limits, for the proposed policy. This “what if” scenarios would be used to determine PML impact on any landmark zones. Other factors that would be evaluated are the current PML CAP and CAP distribution for the landmark and the total book of business for both the producer (i.e., a policy issuer) and the customer (i.e., a policy holder). A Book of Business may be described as the premium value and liability of a set of policies underwritten by the company.
  • an agent and/or policy holder may query the total book of business.
  • inquiry information and approval status is saved to monitor PML versus CAPs.
  • the subscription services provide, for example, the ability to identify whether a policy is at risk and to drill-down capability to policy detail information. These functions serve to help the underwriter make more informed underwriting decisions.
  • FIG. 89 illustrates a policy renewal process 8900 in accordance with certain implementations of the invention.
  • the policy renewal module may be available to business units and remote users, to include in their underwriters standard procedures.
  • a business unit may be described as an organizational sub-division of a business group.
  • the policy renewal process controls the evaluation and determination of which policies, soon to expire, may be renewed.
  • This process uses a policy renewal report to identify businesses that are up for renewal (e.g., 90-120 days prior to their policy expiration date). Those policies that have locations that are at risk may be indicated as red and yellow zones on a map. The process may also indicate whether a policy is not at risk and indicate such locations with green zones on a map.
  • the policy renewal report may be limited to business units and regions based on access rights. Policies up for renewal may automatically be written if they are in a green zone. Policies that are in a yellow zone may be automatically renewed depending upon the business unit. Policies that are in a red zone may require the business unit to review the policy with the home office risk manager administrators. Factors that may influence the policy being renewed may include: whether an entire landmark is at CAP; whether a geo-zone ring that the policy is in is at CAP, while the landmark is not; whether the business unit writing the policy is at CAP, but others in that landmark geo-zone are not; whether the coverage type being written is at CAP, but others in that landmark geo-zone are not; the total book of business for the producer or customer, and/or the financial viability of the policy.
  • Coverage type may be described as the type of policy sold as an individual product or as part of a group under a line of business (e.g.: Property, Casualty, Marine, Auto, Home, Life, etc.).
  • a geo-zone ring may be described as the area between the landmark location and first concentric ring or between the concentric rings emanating outward from the landmark.
  • a Line of Business (LOB) may be described as a group of coverage types (e.g.: Personal, Business, Specialty, Reinsurance, Umbrella, etc.).
  • the producer information may be determined by a query against the policy data store using that producers code and the total book of business summed up.
  • the customer information may be determined by a query against the policy location list that was created as part of the Extract, Transform and Load (ETL) process using, for example, a Dun and Bradstreet data store, to identify an associated parent/subsidiary business hierarchy.
  • ETL Extract, Transform and Load
  • an agent and/or policy holder may query the total book of business.
  • the enterprise spatial system provides a tool that allows identification of policies with locations at risk due to their proximity to a landmark.
  • the location data is used to green light policies that are not in a PML CAP limited landmark geo-zone, and, when policies are in a PML CAP limited landmark geo-zone, additional supporting details about the current business in that landmark geo-zone or about the provider and the customer are made available.
  • FIG. 90 illustrates a process 9000 of an annual in force book of business review in accordance with certain implementations of the invention.
  • An in force book of business review may be available to business units to review predefined landmark in force book of business to determine whether adjustments should be made to control the Probable Maximum Loss (PML).
  • the in force book of business review may be done periodically (e.g., on a monthly basis after each dataset is loaded and on an annual basis as part of the executive review process for adjusting operating parameters).
  • the review may be conducted using the risk manager application, the total book of business and policy renewal reports, and the landmarks list and their associated CAP adjustments performed using the administration application.
  • the review process uses the risk manager application and reports to review historical performance and CAP compliance and to plan up to five (5) quarters ahead based on current policy effective and expiry dates.
  • the risk manager application has the ability to tag a policy for non-renewal status and save the supporting reports/information.
  • the risk manager application also allows “what if” scenarios on an ad hoc basis to review the adjusted PML with inclusion and exclusion of policy information.
  • FIG. 91 illustrates an additional data entry process 9100 in accordance with certain implementations of the invention.
  • the additional data application may be available to business units and to remote users.
  • the additional data application is used to manage the entry of missing address information for some source data sets prior to provisioning the data as input to the ETL process. This may be used, for example, if existing business systems do not provide the ability to capture the data.
  • the additional data application provides a screen to enter location information and policy information used by the risk manager application for the in force book of business. The address and named insured information entered is then searched against the business data store and associated location information lists are generated for review. Moreover, the additional data application provides the ability to review, select, and adjust the retrieved business data, in addition to allowing the business dataset to be queried directly.
  • the administration functionality is used to set the parameters for the risk manager application operation and reporting capability. Some of the risk manager administrators are granted access to the setup administration functions. These risk manager administrators adjust the system setup parameters in response to the in force book of business review of current landmark liability. These parameters control the PML caps that are used to enforce both the new business and existing business renewals.
  • This setup information and definition of landmarks identifies the red zones (e.g., zones in which in force book of business PML exceeds a set CAP limit) and yellow zones (e.g., zones in which in force book of business is nearing the CAP limit or within a landmark zone).
  • red zones e.g., zones in which in force book of business PML exceeds a set CAP limit
  • yellow zones e.g., zones in which in force book of business is nearing the CAP limit or within a landmark zone.
  • Red zones are used to determine whether policies may be renewed. Both red and yellow zones are used to determine whether new business may be written.
  • the CAPs for both red and yellow zones may be adjusted or reallocated based on evaluations of the aggregate business in each business unit, coverage type, specific producers, and specific customers.
  • the setup functions are used to adjust the list of landmarks that are monitored by the system, set to the total PML CAP for that landmark, and distribute the split of that CAP across business units and coverage types.
  • the PML caps may be adjusted for the entire or reallocated between business units or coverage types depending upon the outcome of the review. Additionally, geo-zone rings, disaster rates for event types, PML formulas, and other parameters may be managed.
  • the adjusted setup parameters may be applied in a simulation mode to allow comparisons between the different versions of parameters or temporal views of the parameters applied against multiple versions of the historical batch loads. Once comparisons are done, the setup parameters may be saved as a correct set that future landmark PML caps may be determined from.
  • the data management process contains a set of system modules that handle different parts of the overall functionality and supporting processes. Each module plays a part in either moving the data from the current enterprise source to the end system user or delivering some associated business functionality related to the dataset.
  • FIG. 92 illustrates an ETL process 9200 in accordance with certain implementations of the invention.
  • the ETL process handles the movement of data sources provided by the various business units into the data repository. During this process, the data is cleansed, geo-coded and spatially provisioned for non-spatial batch reporting. Once loaded into the data repository, reports are automatically provided to the risk manager administrators and business managers. The loaded data becomes the current, active dataset used by the applications of the ESS system service.
  • the ESS system service may be organized into the following service categories: application services (e.g., hosted application functionality delivered as browser-to-Web server HTML services); data services (e.g., processing and deployment services for third party vendor data and client internal data); infrastructure services (e.g., management of production systems hosting application and data services); and client services (e.g., customer support for applications and operational issues).
  • application services e.g., hosted application functionality delivered as browser-to-Web server HTML services
  • data services e.g., processing and deployment services for third party vendor data and client internal data
  • infrastructure services e.g., management of production systems hosting application and data services
  • client services e.g., customer support for applications and operational issues.
  • the ESS application service is provided as hosted application functionality delivered as Web server-to-browser HTML and other content services.
  • the risk manager application service provides functionality with a spatial GUI interface for mapping and analysis by risk manager administrators. This functionality includes basic mapping, landmark ring analysis, address ring analysis, and spatially oriented reporting with policy detail drill-down capabilities.
  • Interactive mapping application services provide a set of menu options for choosing a Area of Interest (AOI) that a user is interested in.
  • AOI Area of Interest
  • the AOI may be described as the specific location on earth and the surrounding viewing window that is used to locate and display a Web based map and the associated layers of pertinent information the user desires.
  • mapping application services display a graphical map view of the different data layers.
  • FIG. 93 illustrates a map view 9300 in accordance with certain implementations of the invention. From the map view of the mapping application services, the user selects relevant data intersections. Data intersections are navigable using the search by and layer views. The user may then access a summary PML report for the policies associated with a selected landmark.
  • a mapping application service interfaces with the user via user interfaces.
  • the user begins at a main screen, selects landmark from a search by drop-down, and then selects a specific landmark from the associated drop-down (i.e., this associated drop-down is populated with the landmark data).
  • the landmark location is displayed, and the user then selects the ring analysis tool from the toolbar.
  • the user proceeds to the ring analysis screen, which allows the user to select an event type, and define the attributes of the ring analysis. Once the user selects an event type, the remaining values are pre-populated with the appropriate defaults previously set for the event. The user has the ability to over-write these defaults.
  • the user is returned to the main screen where the ring analysis is undertaken.
  • the rings identify policies that fall within them.
  • a summary of the liability premium and PML information is shown in an analysis summary window on the main screen. The user may access additional reports by selecting a Details button.
  • the address risk ring analysis scenario may be used when a risk manager administrator is considering a policy that an underwriter has escalated (i.e., taken to a manager), or when conducting an ad-hoc landmark analysis.
  • a mapping application service may be provided for the address risk ring analysis scenario.
  • a user begins at the main screen.
  • the user selects Address from the search by drop-down, and an address pop-up dialog appears.
  • the user enters the address information.
  • the address location appears in a Main Map Window.
  • the user selects the ring analysis tool from the toolbar.
  • the user proceeds to the ring analysis screen, which allows the user to select an event type, and define the attributes of the ring analysis. Once the user selects an event type, the remaining values are pre-populated with the appropriate defaults previously set for the event. The user has the ability to over-write these defaults.
  • the user is returned to the main screen, the ring analysis undertaken.
  • the rings identify policies that fall within them.
  • a summary of the liability premium and PML information is shown in the Analysis Summary window on the main screen. The user may access additional reports by selecting the Details button.
  • Certain implementations of the invention provide spatial reporting.
  • the risk manager application service provides policy report functionality using spatial dimensions defined by the geo-zone of a selected landmark and presents reports in both summary and detailed formats. Additional policy data filtering is provided to limit spatial dimensions by the business dimensions of either coverage type or business unit.
  • a summary report may be provided directly on the main application screen showing, for example, liability, premium, and PML totals within the geo-zone ring areas. Both summary and detail reports may provide policy data totals in tabular form organized by geo-zone ring showing, for example, liability, premium, PML, CAP and number of policies. Additional sub-totals may be provided for both spatial and business report dimensions.
  • Detailed drill-down reports may be displayable in a full report mode to provide a landmark detailed policy PML report.
  • Data included in the detailed report may be limited to the set of policies requested, such as through the spatial and business dimensional filters used during navigation to the detailed report.
  • the user For spatial reporting, the user has access to the reports once a landmark or address risk ring analysis has been undertaken. Initially, the user selects the Details button from the bottom of the main screen. The user is taken to the first-level reporting screen. In certain implementations, by default, the tabular report shows the information for all business units and for all coverage types. A drop-down control at the top of the screen allows the user to select a specific business unit or coverage type, at which time the entire display may be updated to illustrate the selected business unit or coverage type. Additionally, after selecting business unit or coverage type, when appropriate data is displayed, a user may request details for the data, export the data (e.g., to a CSV file), print the data or show the data on a map.
  • export the data e.g., to a CSV file
  • the user may drill-down into the data, for example, by zone, by selecting the zone number display within the table (e.g., a hyperlink).
  • the drill-down pop-up is displayed. If the user was filtering on business unit, then the drill-down brings up the drilldown by business unit for that zone. If the user had filters on coverage type, then the drilldown launches the report pop-up for drilldown by coverage type for the zone. The user may drill-down one more level by selecting either the business unit or coverage type, and get to another pop-up that displays the policy information.
  • a landmark summary policy PML report by business unit totals policies in a geo-zone and displays them in tabular form by business unit by geo-zone ring showing, for example, liability, premium, PML, CAP and number of policies.
  • the landmark summary policy PML report by coverage type totals policies in a geo-zone and displays them in tabular form by coverage type by geo-zone ring showing, for example, liability, premium, PML, CAP, and number of policies.
  • the landmark detailed policy PML report provides a detailed list of policies within a landmark geo-zone for a specific business unit or coverage type organized by geo-zone ring.
  • the policy details includes the policy number, named insured, address, coverage type, business unit liability amount, PML amount, premium amount, effective date and expiration date.
  • the detail report includes both vertical sub-totaling and full report totaling columns.
  • the underwriter application service allows the user to select a list of locations using a business data source (e.g., a Dun and Bradstreet data store) to perform a search by company name and then checks those locations against a customer-specific business rules to determine a location rating.
  • the search results indicate whether any of the locations are in a landmark with a high risk rating indicating to the underwriter that they should contact the home office to secure approval to underwrite the new business.
  • the underwriter application service may be accessed through the portal menu application service. Once selected, a policy location search screen is displayed that allows the user to select a list of locations to check. After the locations are selected, the locations are retrieved, a check is performed, and the search results screen is displayed with search results.
  • the first step in the underwriter application service is the policy location search using a business source data store.
  • the underwriter application service provides a user interface connected to a business data store search interface to support the different functionality required by the underwriter application service and the additional data application service.
  • a name or partial name typed into the edit window controls the contents of a list of named insured locations in a list window below the edit window.
  • the list below may be generated from the business data store and may contain location information. Any data entered helps limit the search list that is returned and from which the user selects the actual Named Insured (e.g., typing the first three characters would return the list with all matches containing those three characters regardless of position). The user then selects all desired locations to be checked against the data store to identify high-risk locations.
  • the business data store search interface provides access to, for example, the Dun and Bradstreet data store of companies containing 16 million records.
  • the search interface provides two request-response style operations to find either all Child Companies or all Parent/Child Companies.
  • the search request contains either a D-U-N-S number or Named Insured text identifier that specifies the parent company.
  • the search response is configurable to provide a varying number of search result columns from the business data store.
  • the Find All Child Companies operation obtains all child companies given a specified parent company.
  • the Find All Parent/Child Companies operation uses the request-response style of operation to obtain the children, the parent, and any peer companies and associated child companies given a specified parent company.
  • a policy location list selected from a Policy Location Search is geo-coded and then searched spatially against the landmark geo-zone s to decide whether an insurance policy for that landmark should be approved.
  • the search screen contains the results of a policy location query against the landmark data store.
  • a list of policy locations is displayed to the user containing a status indicating whether they are within a restricted landmark geo-zone. Any policy locations selected that could not be geo-coded may indicate a status of ‘Unknown’ in the results displayed in the search screen. Geo-coding any business data store prior to searching may reduce the ‘Unknown’ result and increases the screen display response time.
  • the additional data application service like the underwriter application service, allows the user to select a list of locations through a Policy Location or business data store search and then checks those locations against the data store for locations that are near landmarks.
  • the search results indicate whether any of the policy locations are in a landmark with a high risk rating indicating to the additional data application operator that the operation should research the location further and assure that all policy data available for those locations is accurate.
  • the operator is allowed to save the list of high-risk locations out to an external data-store.
  • the additional data application service is accessed through the Portal Menu application service. Once selected, a Policy Location search screen is displayed to the user that allows the selection of a list of locations to check. After locations are selected, they are retrieved and checked. The search results screen is displayed for the user. Then, the user is allowed to write the list of locations to an external data store.
  • the additional data application service is designed to work for an operator who is entering a list of policy named insured into the business data store user interface screen.
  • the Policy Location Search for the additional data application service operates in the same manner as the Policy Location Search in the underwriter application service.
  • the landmark search for the additional data application service operates in the same manner as the landmark search in the underwriter application service, with the addition of a Policy Location Saving option.
  • the operator has the option of saving the list to an external, comma separated text file. If selected, the list of locations is written to the external text file using the named insured as the key associated with all records written.
  • the reporting application service provides non-spatial reporting functionality for the business data and includes at least the following management reports: total book of business by landmark, policy renewal by landmark, and new business by landmark.
  • each of the reports provides summarized views of total PML values organized monthly by division. Additionally, each report cell is linked to allow drill-down into the associated monthly sub-reports and viewing of policy details that were used to make up the summary reports roll-up.
  • the reports are run and cached automatically as part of the ETL process after data is pushed into the business data repository. Users with sufficient reporting rights are also able to run the report ad hoc. Contents of the report are filterable by division for divisional users who have limited rights to the report. These reports are used for managing the new business underwriting and renewal process and PML actual vs. CAP risk assessment.
  • the total book of business by landmark report is a list of all book of business (e.g., by division) using, for example, a 1-year or more range allowing review or projection.
  • the report is calculated on date of policies that are within a given landmark's geo-zone that become effective or expire during the report period. This report is generated and cached automatically as part of the ETL process after data is pushed into the business data repository. Users with report rights are also able to run the report in an ad hoc mode.
  • the contents of the report are filterable by division to support divisional users who have limited rights to the report.
  • the following parameters describe the total book of business by landmark report layout and data organization: order (e.g., by landmark (if All selected) then by division); period (e.g., up to 15 month period); vertical axis (e.g., division); horizontal axis (e.g., monthly); data cells (e.g., total PML (based on in force book of business in effective or expiration month and year)); vertical totals (e.g., total PML for all divisions); horizontal totals (e.g., PML CAP per division); report total (e.g., sum of vertical totals (PML vs. CAP vertical total); detail drill-in (e.g., one month, one division cell, click to detailed report); and presentation (e.g., color coded).
  • order e.g., by landmark (if All selected) then by division
  • period e.g., up to 15 month period
  • vertical axis e.g., division
  • horizontal axis e.g., monthly
  • the data cells of the total book of business by landmark report are used to link to one of two different drill-down reports: policy detail by landmark and policy detail by division. Use of either are either selected manually or automatically based on user role.
  • a policy detail by landmark sub-report may be available.
  • the policy detail by division report contains a list of policies and associated details for the specific division and month data cell selected.
  • the main report vertical axis is a policy list with an optional location sub-list.
  • the horizontal axis columns of data include, for example, the following data: policy number, named insured; total liability; calculated PML; premium; effective date; expiration date; and number of locations.
  • the policy renewal by landmark report is a list of renewals (by division) using, for example, a 1-year or more range allowing review or projection.
  • the report is calculated on the dates of policies that are within the landmark's geo-zone that expire during the report period.
  • the following parameters describe the policy renewal by landmark report layout and data organization: order (e.g., by landmark (if all selected) then by division); period (e.g., up to 15 month period); vertical axis (e.g., division); horizontal axis (e.g., monthly); data cells: (e.g., total PML up for renewal (expires) that month); vertical totals (e.g., total PML up for renewal for all divisions); horizontal totals (e.g., total PML per division, CAP per division (not applicable if all)); report total (e.g., sum of vertical totals (PML)); detail drill-in (e.g., one month, one division cell click to detailed report); and presentation (e.g.,
  • the new business by landmark report is a list of new underwritten policies (by division) using, for example, a 1-year or more range allowing review or projection.
  • the report is calculated on the dates of policies that are within the landmark's geo-zone that become effective during the report period.
  • the following parameters describe the new business by landmark report layout and data organization: order (e.g., by landmark (if all selected) then by division); period (e.g., up to 15 month period); vertical axis (e.g., division); horizontal axis (e.g., monthly); data cells: (e.g., total PML up new business (effective) that month); vertical totals (e.g., total PML up for new business for all divisions); horizontal totals (e.g., total PML per division, CAP per division (not applicable if all)); report total (e.g., sum of vertical totals (PML)); detail drill-in (e.g., one month, one division cell click to detailed report); and presentation (e.g., color coded).
  • order e.g., by landmark (if all selected) then by division
  • period e.g., up to 15 month period
  • vertical axis e.g., division
  • horizontal axis e.g., monthly
  • data cells
  • non-spatial reports are provided to support policy detail reporting in the same format as the policy detail by landmark sub-report.
  • the policy detail reports are able to run by the following business dimensions: policy by business unit; policy by division; policy by department; policy by coverage; policy by line of business; policy by named insured; policy by policy number, and policy by landmark/division CAP limits.
  • the enterprise spatial system provides additional ad hoc reports as part of client services.
  • the user authenticates into the ESS system service through, for example, a site minder or other authentication system.
  • the authentication system passes the user to the Portal Menu application service with a session cookie and user identifier.
  • the session cookie is verified by the Portal Menu application service using the authentication system Web plug-in interface over a back end connection.
  • the user identifier is used to match the user, once the user is configured in the system using the administration application service.
  • the ESS system service session is created.
  • the ESS system service takes over and provides the access control. Based on the user's role, the user provided access to the ESS system service functionality and data as allowed.
  • Each ESS system service user is assigned a role that controls access to system functionality and data.
  • the ESS system service administrator may be able to assign one of any number of system roles to each user.
  • Each ESS system service user is provided a user profile that contains data unique to that user and used to provide personalization to the user experience.
  • the administration application service supports both standard and custom user profile information.
  • the administration application service standard user profile supports the following information: user identification; user full name; user e-mail address; and user role.
  • each ESS system service user is provided a set of additional profile information.
  • the custom user profile data includes elements, such as the business unit of which the user is a member.
  • the ESS system service role is administered using the administration application service.
  • the ESS system service administrator is able to add, configure, and audit each system role.
  • the ESS system service administrator is able to create roles that provide any combination of system functionality and data to be configured under a single role.
  • Each ESS system service user is assigned a role that controls their access to system functionality and data.
  • several distinct user roles are implemented to support the different user types of the system, including, for example: super users (e.g., capable of administration, interactive mapping, and running reports); regional agent (e.g., capable of running reports limited by business unit and region); business units (e.g., capable of running reports limited by business unit); home office (e.g., capable of interactive mapping and running reports); and data administrator (e.g., capable of using additional data application).
  • super users e.g., capable of administration, interactive mapping, and running reports
  • regional agent e.g., capable of running reports limited by business unit and region
  • business units e.g., capable of running reports limited by business unit
  • home office e.g., capable of interactive mapping and running reports
  • data administrator e.g., capable of using additional data application
  • the ESS system service provides a role based access control functionality that provides the ability to control who has access to any of, for example, the following: specific menu functionality and specific data sets.
  • the administration application service provides the ability to audit users usage of the ESS system service. For example, user activities are tracked for usage auditing and reporting. User activities are tracked in the ESS system service from initial authentication to logout. Items tracked include which site pages were used, which functions were executed, and which data was accessed. The administration application service allows searching and sorting of usage for individual users or across users. User errors or system violation attempts are tracked and made auditable within the administration application service.
  • the administration application service provides the ability to manage landmarks configured in the landmarks list or layer. Other administration features are done using the business data list maintenance section of the service, including, for example adjusting additional landmark business data such as PML CAP.
  • a user selects an address. Once the address is selected, the user may save the address as a landmark. For example, this may happen after the user has undertaken an address risk ring analysis. If the user's role allows, the user selects Save as landmark from the File Menu. Unauthorized users do not have access to this functionality.
  • the Save landmark screen appears pre-populated with spatial information, and allows the user to input additional information, such as the landmark name, type (from a selection list), CAP limit, and rating.
  • the landmark is saved to a data store. Alternatively, a user may choose a Cancel option instead of the Save option.
  • new landmarks may be enabled for saving to allow analysis but not included in overall policy PML calculations until the next ETL process is run in the staging data store and that data is then loaded into production.
  • the administration application service provides the ability to manage business data lists in support of the policy and landmark data layers.
  • the business data list management screens are accessed as a channel from the Portal Menu application service and exposed to the user based on the user's role after the user is authenticated.
  • the administration application service is also accessible through an external link on a menu bar.
  • the administration application service provides the ability to manage, for example, the following business data lists: landmarks, event types, coverage, business unit, and calculation factors.
  • the administration application service provides administration of the list of locations considered as landmarks in the system.
  • a landmark is a specified geo-zone that is an area requiring in-force book of business monitoring. Current in-force book of business risk locations are identified, PML calculations performed, and the results stored during the ETL process for fast retrieval and reporting.
  • Each landmark is able to be assigned a total liability CAP.
  • This CAP is unique to the landmark and may be adjusted based on annual review by the executive committee.
  • a single landmark CAP is in force on those landmarks that are active; the CAP is allocated, by percentage amount, across each business division; and reports show liability, premium, total CAP and total PML for the landmark and then by geo-zone for that landmark.
  • the administration application service provides administration of ratings for CAP against the calculated PML. Ratings may be assigned, for example, from a range of 1-10, where ten is a worst case. In certain implementations, zero (0) may be a default value for a rating in the landmark table when a landmark is not included in the stored PML to landmark results table. Ratings apply globally to landmarks and severity levels. The ratings represent a percent of PML. For example, a zero % rating would mean the record is not in any landmark. Policies are ranked and assigned a rating during the ETL process. In certain implementations, ratings for policies that appear in more than one landmark geo-zone may be treated as worst case, not additive.
  • the administration application service provides administration of the percent values of the total landmark CAP allocated to each of the Business divisions.
  • the values in this table may be in percent (%) format to eliminate modification when the landmark CAP changes.
  • a divisional percentage of CAP may be decided, for example, once per year by an executive meeting. By division CAP percentages may be used for reports and may not be required in the risk manager application.
  • the administration application service provides administration of the list of event types enabled for each landmark.
  • the landmark event type configuration may be implemented as an additional maintenance screen accessed from the landmarks main maintenance screen.
  • the administration application service provides administration functionality that allows the addition of new event type severity geo-zones.
  • the administration application service provides administration of the geo-zone radius sizes and number of rings for each event type severity level. This is the concentric ring (zone) size from epicenter of the geo-zone. In certain implementations, the default is six (6) rings and is limited to a minimum of one (1) and a maximum of ten (10) rings. All geo-zone rings specified for a severity level may be the same for all landmarks.
  • FIG. 94 illustrates a screen 9400 with event information, ring information, and ring weighting in accordance with certain implementations of the invention.
  • the administration application service provides administration of the damage rates for each geo-zone ring for each severity level. Damage rate may also be referred to as a severity factor that is used in the PML calculation.
  • damage rates specified for a severity level are the same for all landmarks.
  • the administration functionality includes the ability to copy another severity to minimize the data reentry work for the administrator.
  • the geo-zone ring and damage factor are changeable for temporary “what if” scenarios applicable to a single landmark location.
  • setup changes that are applicable to an entire policy dataset require batch ETL reprocessing of current policy layer off-line.
  • the administration application service provides administration of the coverage that may be included in the PML calculations. Coverage values apply to all landmarks for all severities in all geo-zone rings. Each coverage type is assigned a line of business from a list managed from a sub-screen accessible from the coverage administration screen.
  • the administration application service provides administration of organizational structure broken down currently by division, group, and business unit.
  • landmark CAP percentages are assigned at the division level and reporting is drilled down to on the policy by business unit level.
  • the administration application service provides administration functionality to support parameters used in PL/SQL stored procedures that contain calculations for various business logic.
  • PL/SQL may be described as a procedural language extension to Structured Query Language (SQL).
  • SQL Structured Query Language
  • the system supports parameter configuration for landmark ratings, probable maximum loss and workers compensation limit calculations.
  • PML calculations may be based on the total book of business liability for policies held in a given geo-zone ring multiplied by the damage rate assigned to that geo-zone ring.
  • Landmark ratings may be determined based on summing PML values vs. each landmark CAP. Damage rates vary based on the type of event; therefore, PML is different for each type of event and for each landmark (e.g., due to number of policies in each geo-zone ring).
  • access to the spatial and non-spatial application and data services provided by implementations of the invention is controlled through a portal service using a portal home page containing channels for each application.
  • the portal service displays an entry (welcome) screen that may be unique and co-branded and that branches the user to appropriate functionality associated with the user's role. Access to the portal may be provided through client authentication.
  • FIG. 95 illustrates a portal entry screen 9500 in accordance with certain implementations of the invention.
  • the portal may be a series of HTML pages that users first go through in order to access the ESS system services. Under the enterprise spatial system design, the portal displays different HTML pages depending on who the user is. This determination is made at the login stage when the user first logs into the service.
  • the ESS system service authentication is provided through integration with the client's authentication system, which is hosted and managed by the client.
  • User authentication criteria, username, and password, are hosted and managed by the client in, for example, a domain services repository. Users desiring access to the ESS system service are explicitly added to the application services and their roles are assigned using the administration application service delegated to the risk manager administrators.
  • the authentication interface is integrated into the application service and replaces a native authentication service.
  • the integration consists of enterprise spatial system Web servers accepting a session cookie through URL parameters in an HTTPS post from the authentication Web server.
  • the session cookie is then verified using, for example, a back end Web connector.
  • the username may be used to create a portal and application service session, and the user is then presented with portal channel content and applications based on access control rights.
  • the enterprise spatial system maintains a Lightweight Directory Access Protocol (LDAP) data store that contains data on users and roles.
  • LDAP data store may be maintained using the delegated administration application service.
  • this LDAP data store is not externally accessible.
  • FIG. 96 illustrates a portal menu application service site map 9600 in accordance with certain implementations of the invention.
  • the enterprise spatial system provides a hosted portal system to centralize access to ESS system services.
  • FIG. 97 illustrates a sample of a Portal Menu application service main page and subsequent screen flow 9700 based on user selections in accordance with certain implementations of the invention.
  • a super user who has access to all of the enterprise spatial system functionality enters into the ESS system service on the portal page and subsequently branches to main functional service areas.
  • each of the ESS system services are accessed through application links from the portal channels.
  • the portal service may be expanded based on changing system requirements.
  • several additional standard application services are provided, including, for example: visual reporting; collaboration and workflow improvement; drill down into counties, ZIP codes, states, and census tracts; point n′ view information; spatial queries; printing and saving maps and reports; on screen summary section; cartography and map annotation tools; online help; application upgrades; and customizations.
  • FIG. 98 illustrates a screen 9800 of a selected map image with a map summary in accordance with certain implementations of the invention.
  • FIG. 99 illustrates a screen 9900 of a selected map image with an analysis summary in accordance with certain implementations of the invention.
  • the enterprise spatial system provides a highly collaborative environment for risk analysis and visual communications.
  • users may undertake “what if” scenarios, and save out an interactive project for colleagues to work with, conduct further analysis upon, or simply print out.
  • the enterprise spatial system provides sophisticated capabilities that allow for users to share projects or graphic outputs in a way that ensures that those members on the team whom the author deems appropriate may have access to the project or graphic.
  • a suite of analysis tools within the enterprise spatial system application services empower the user to drill-down into the details of a data set within specific boundary areas, including counties, ZIP codes, census tracts, and states. With these capabilities, clients may consider key information with respect to how the information is broken out within one or more of these geographic regions.
  • a point n′ view tool is provided that allows a user to quickly identify certain attributes of any feature that is currently available within the enterprise spatial system mapping work area. With a simple click of the mouse, the user gains access to the information describing the selected feature.
  • FIG. 100 illustrates a point n′ view tool 10000 in accordance with certain implementations of the invention.
  • the enterprise spatial system provides extensive tabular reporting capabilities, and tied closely to this reporting is the system's ability to run complex Boolean queries consisting of multiple statements. With these capabilities, risk manager administrators may drill-down deeply into the data, and find exactly the information that they need in a timely manner.
  • FIG. 101 illustrates a full report screen 10100 in accordance with certain implementations of the invention. A user may select a Print button or an Export button on screen 10100 .
  • FIG. 102 illustrates an analysis summary 10200 in accordance with certain implementations of the invention.
  • the enterprise spatial system provides annotation and cartographic tools that allow clients to output high quality reports and graphical risk representations.
  • annotation tool services the user may add text, boxes, lines, arrows, and more.
  • the enterprise spatial system has a complete, integrated commercial-quality online help system to assist the user through the various tasks within the application services. Included in the help system are indexing and searching capabilities.
  • clients who purchase the subscription services receive performance and feature enhancements as they become available.
  • enterprise spatial system enables clients to customize and enhance the system without dependence on enterprise spatial system.
  • this may include Web services exposed through application Program Interfaces (API's) that enable clients to expand data layers and integration with other applications or application services.
  • API's application Program Interfaces
  • the enterprise spatial system provides data services in support of the ESS system service implementation.
  • the enterprise spatial system data services include management of both client business data and additional vendor data.
  • the enterprise spatial system data services provide various supporting data layers for use in the ESS system service.
  • the enterprise spatial system offers both standard and premium layers that may be requested at any time for integration into the ESS system service.
  • the following data layers are available for use in the ESS system service on a nationwide basis included in enterprise spatial system's standard service subscription fee: spatial layers, state boundaries, county boundaries, ZIP code boundaries, city and town locations, metropolitan boundaries, detailed navigable roads, railroads, major % water-bodies, and a geo-code address data store.
  • US Census Bureau may be provided as standard reference data layers: (e.g., year 2000) census boundaries and population statistics w/census information for block, block group, tract and county levels, where data is from first release from Census Bureau; total population, race (e.g., white, black, Native American, Asian, Pacific Islander, Hispanic, multi-racial, other); gender (e.g., males, females) and age (e.g., under 5, 5-17, 18-21, 22-29, 30-39, 40-49, 50-64, 65+, median male age, median female age); and household information (e.g., number of households, average household size), family distributions (e.g., single parents, married parents, married no kids, etc.), number of families, average family size, and housing unit information (e.g., vacant, occupied, owner-occupied, renter-occupied).
  • total population, race e.g., white, black, Native American, Asian, Pacific Islander, Hispanic, multi-racial, other
  • Digital Ortho Quarter Quads US-wide aerial photography (i.e., in certain implementations, ⁇ 90% of the US is covered with most imagery being less than five (5) years old and 85% of the imagery is black and white with the remainder being color-infrared, with spatial resolution being 1 m;
  • Digital Raster Graphics DRG—US-wide “topo” maps at three scales (1:250,000, 1:100,000 and 1:24,000), where data may be 10-20 years old with updated DRGs in some areas and where data shows general land cover, some infrastructure, administrative boundaries, and topographic information;
  • National Elevation Dataset NED—US-wide elevation data at 1 km, 300 m and 30 m resolutions.
  • the enterprise spatial system premium layers may be chosen following evaluation of the major data vendors for each product category.
  • the enterprise spatial system has built an understanding of the underlying data quality that enables the enterprise spatial system to make informed recommendations to clients as to which data best suits their specific business use.
  • the enterprise spatial system builds strategic relationships with several key data providers to ensure that enterprise spatial system's clients receive the most business value from their data investment, including, for example: business point data (e.g., Dun and Bradstreet, InfoUSA, Experian, etc.); lifestyle and demographic (e.g., AGS, Claritas, etc.); real-time and historic weather (e.g., Meteorlogix, etc.); high quality aerial and satellite imagery (e.g., Emerge, Digital Globe, etc.); healthcare industry information (e.g., IMS Health, etc.); detailed hydrology including rivers, streams, and flood plains; area codes; and any other layers from commercial or government sources as generally available.
  • business point data e.g., Dun and Bradstreet, InfoUSA, Experian, etc.
  • lifestyle and demographic e.g., AGS, Claritas, etc.
  • real-time and historic weather e.g., Meteorlogix, etc.
  • high quality aerial and satellite imagery e.g., Emerge, Digital Globe, etc
  • the enterprise spatial system data service's Dun and Bradstreet data contains business name, parent-child hierarchy and address location information for companies in the United States provided by Dun and Bradstreet.
  • the Dun and Bradstreet data is provided by Dun and Bradstreet under a license agreement between Dun and Bradstreet and the client that provides for external hosting of the data by the enterprise spatial system.
  • the data may be provided as a single, comma separated ASCII format file and provided in its original form as delivered from Dun and Bradstreet
  • the data may be provided with a data dictionary describing the data contents.
  • the Dun and Bradstreet data is loaded into a data repository (e.g., one from Oracle corporation) and then geo-coded and address cleansed to provide spatial referencing to each business location. Any data not cleansed and geocoded may be cleansed and geocoded as it is accessed.
  • the geocoding service allows users to geocode an array of addresses using a specified spatial reference system.
  • the geocode addresses operation uses the request-response style of operation to obtain a geocode for an array of addresses using the specified spatial reference system.
  • the address cleansing service allows users to standardize an array of addresses according to the preferred US Postal service (USPS) addressing standards.
  • USPS US Postal service
  • the cleanse address operation uses the request-response style of operation to standardize an array of addresses according to the preferred USPS addressing standards.
  • the Dun and Bradstreet data may be hosted on-line in a data store (e.g., one from Oracle corporation) in the enterprise spatial system secure data facility and access to the data may be provided via the underwriter application service, the additional data application service, and the business data store search application service.
  • a data store e.g., one from Oracle corporation
  • access to the data may be provided via the underwriter application service, the additional data application service, and the business data store search application service.
  • Business data contains the client's policy data list and high-risk landmark data list, both configured with spatial dimensional indexing. Additionally, the business data contains associated lookup and associative entities to support business dimensional analysis of both the policy and landmark data.
  • An Extract, Transform and Load (ETL) process handles the movement of data sources provided by the various business units into the enterprise spatial system data store. During this process, the data is extracted, loaded, cleansed, geocoded and spatially provisioned for non-spatial batch reporting. Once loaded into the enterprise spatial system data store, the loaded data becomes the current, active dataset used by the ESS system services.
  • ETL Extract, Transform and Load
  • the client is responsible for the Extract portion of the ETL process.
  • the business data is provided to enterprise spatial system by the client on a periodic basis in read-only format with the intent of the enterprise spatial system to prepare, load, and host this data in the enterprise spatial system data store to complete the Transform and Load steps of the ETL Process.
  • the business data is provided as policy data in a comma separated, ASCII text file format.
  • the business data may be provided from sources compliant to a consistent data specification.
  • the business data may be provided to the enterprise spatial system with a data dictionary containing the data specification.
  • policy data is not administered using the administration application service. Policy data is loaded using the ETL processes and associated enterprise spatial system data services.
  • a policy supports up to 450 locations.
  • policy liability limits are stored at the policy level, and may be updated to be by location or umbrella type or other subdividing factor.
  • Policy liability and premium may be stored and organized by policy, rather than by policy location. Calculations of premium and liability caps are may not be applied by location. Any one location may be considered to be able to apply 100% liability for the entire policy.
  • premiums are not totaled or displayed at any intermediate level, such as by business unit or by coverage type to avoid a duplication calculation inclusion problem.
  • Totaling and display may be at geo-zone ring level, or above, to support total premium vs. CAP and may be at the detailed policy level.
  • the client provides business data to the enterprise spatial system with complete policy and address data.
  • no additions to business data are done by the enterprise spatial system, with the exception of address cleansing and geocoding.
  • the client uploads the business data to the enterprise spatial system in, for example, an encrypted file format over a secure FTP interface hosted and managed by enterprise spatial system.
  • the client uploads the business data on a periodic (e.g., monthly) basis.
  • the enterprise spatial system provides address cleansing, geocoding, and data store loading data services to transform and load the business data provided by the client into the operational data store in the enterprise spatial system secure data facility.
  • Policy location data is geocoded using the enterprise spatial system standard geo-coding engine and underlying street and boundaries datasets. Any policy locations that are not successfully geo-coded are then passed to an address cleansing system and then re-geocoded. Any policy locations that do not successfully geocode are then reported back to the client, for example, on a processing scorecard.
  • policy location data that does not initially geocode successfully is run through an address cleansing/matching system that standardizes the address data formant and validates the address data using the USPS address data store.
  • the resulting policy location data is then re-geocoded.
  • Geocoded and cleansed policy and policy location data is loaded into a normalized data store schema by the enterprise spatial system using a loading procedure provided by the client.
  • the enterprise spatial system provides the client with a scorecard report on each dataset provided to the enterprise spatial system.
  • the scorecard report contains a summary total of the number of policy and policy locations that successfully were processed and loaded.
  • the report also contains the total number of policies that failed to process and the status of that associated failure. Additionally, a complete set of data that failed processing, along with failure result status, is provided to the client.
  • a production data store contains the main data store that supports the ESS system services and all associated reporting.
  • the production data store contains policy and landmark data and supporting tables, including, for example: two main spatial layers: landmarks and policies; a third geo-zone layer that defines zone rings per landmark and associated business data (e.g., edited by the administration system); spatial associations between landmarks and policies that are pre-generated to enable data warehouse reporting; period (e.g., monthly) complete data loads; up to five (5) quarters (15 Months) of data that are captured (e.g., on a monthly basis); specific event data that may be stored permanently; and temporal analysis that is expected on the datasets.
  • the data is loaded into the operational data store monthly from the ETL process and carries a minimum of 15 months of historical data in addition to the most recent, current data load.
  • the applications and reports work primarily on the current load, but may be run against historical datasets for analysis or temporal comparison. Specific datasets (e.g., possibly limited by region, city or other) are able to be marked for permanent on-line retention. Data greater than 15 months and not marked for permanent on-line retention may be purged to off-line tape storage.
  • the total amount of physical storage used is limited based on enterprise spatial system data services pricing.
  • a physical schema contains tables for: policies, landmarks, event types, coverage, business units, Dun and Bradstreet data; and states worker's comp data.
  • the main data associations include: policy to coverage, policy to policy details and locations, policy location to coverage, coverage to event damage rates, landmarks to business units, and landmarks to event types. Additional tables may be added to support temporal version control and any supporting tables to house pre-generated periodic report data (e.g., monthly and yearly forecast report data).
  • the operations data store contains PL/SQL stored procedure code that contains, for example, Intellectual Property (IP), for the client.
  • IP Intellectual Property
  • the PL/SQL that contains this IP is provided by the client for use in the enterprise spatial system application and data services.
  • the ETL process stored procedure takes a non-normalized data record and normalizes the data record into the data store schema. Additionally, the ETL process adds any initial, static spatial relationships between the policy locations and landmarks that may be useful.
  • the ETL process calls specialized stored procedures to generate Probable Maximum Loss (PML), landmark ratings, and workers compensation columns of data that are added to the policy data upon loading.
  • PML Probable Maximum Loss
  • a PML PL/SQL stored procedure generates the PML value column based on the total policy liability and a formula embodied in the PML PL/SQL stored procedure.
  • the resulting data column is then used by the enterprise spatial system applications to delivery the information to the ESS system service users.
  • a landmark ratings PL/SQL stored procedure generates the landmark ratings value column based on the policy and landmark data and a formula embodied in the landmark ratings PL/SQL stored procedure.
  • the resulting data column is then used by the enterprise spatial system applications to delivery the information to the ESS system service users.
  • a workers compensation PL/SQL stored procedure generates the workers compensation value column based on the total number of employees for a company and a formula embodied in the workers compensation PL/SQL stored procedure.
  • the resulting data column is then used by the enterprise spatial system applications to deliver the information to the ESS system service users.
  • the operations data store is maintained by enterprise spatial system data store administration/operations personnel. This administration includes initial setup, periodic updating, data store storage and performance management and backup and recovery.
  • FIG. 103 illustrates a sample network 10300 implementation to connect a client data center and the enterprise spatial system secure data facility to enable real-time access to ESS system services in accordance with certain implementations of the invention.
  • the enterprise spatial system provides a secure data facility.
  • the enterprise spatial system's secure data facilities were designed to provide high standards of secure data storage and system operation by providing system and structural integrity, complete redundancy, and advanced security solutions.
  • the enterprise spatial system maintains three data centers in various locations (e.g., Irvine Calif., Also Viejo Calif., and Charlottesville Va.). One of the data centers may be designated a primary secure data facility.
  • the secure data facility is a $100M state-of-the-art facility designed to provide a secure, liable environment to protect substantial investments in servers, networking, storage, and private data.
  • the design includes redundant power and cooling systems, in addition to world-class hardware with advanced security tools and fast redundant networks.
  • the primary secure data facility is an internet data center.
  • the internet data center may be located in a secure, vault-like facility staffed 24 ⁇ 7, every day of the year.
  • the facility may utilize concrete bunker-style construction in a new, single floor, free standing, 145,000 square foot building.
  • the design and implementation may surpass Exodus 6th generation facility requirements.
  • the facility's physical design may include protection against physical attacks, seismic events, and severe weather.
  • Pre-stressed monolithic slab construction may be utilized to provide enhanced stability and security.
  • the building shell may be constructed with contiguous reinforced concrete to minimize the possibility of illegal entry. External doors and key internal doors may utilize high security steel doors, concrete jams, and bulletproof glass. All mechanical rooms may be completely enclosed and controlled with restricted access.
  • the facility may utilize tamper-proof infrastructure and equipment.
  • the data floor may be segregated into individual cages that are enclosed on all six sides.
  • the cages may be constructed of steel, instead of wire mesh, with small diameter holes designed to prevent the passage of a single network cable. Access to the area under the raised floor may not be allowed and is restricted to authorized personnel only. Motion detectors may be deployed under the raised floor to ensure compliance. Each cage may be locked electronically and access is restricted by cardkey controls.
  • the facility may be designed to withstand seismic events. All racks, storage frames, and infrastructure equipment may be bolted to the concrete sub-floor to prevent movement during seismic activity.
  • Restricted access and site security may be ensured 24 ⁇ 7 ⁇ 365 by an onsite security force.
  • the members of this team are dedicated to this site and well trained in its unique operational policies.
  • Internal areas may be physically segregated into security zones, providing different access restrictions based on each area's sensitivity level. Access to all areas may be restricted to a minimum need-for-access level.
  • Cardkeys and biometric palm scanners may be utilized at entry points.
  • Computer controlled security systems with automated mantraps may control key internal entry points.
  • High security monitoring stations with security personnel may be located at each perimeter entry point. Access between the data floor and shipping/receiving or mechanical areas may require escort by security personnel.
  • the building may be a non-descript concrete building with no external signage.
  • the location may not be advertised and access may be available by invitation only. Also, there may be no known environmental risks in the area.
  • Video surveillance and security systems may cover all internal areas and full-perimeter high-resolution cameras monitor the exterior of the building, roof, and grounds.
  • Motion detectors may be deployed in mechanical access areas, ceiling space, and floor space to ensure that these areas are not accessed without clearance.
  • Security personnel may actively monitor all access and traffic in the facility and external areas. Any items coming into or leaving the facility may be visually checked and, if necessary, inventoried by security. Roving security guards may monitor the site around the clock to facilitate policy compliance and confirm the integrity of site security.
  • All equipment arriving or leaving the site may be staged in a protected shipping area, inventoried, recorded, and signed for by two parties.
  • On-site security and Network Operations Center (NOC) personnel may manage this process jointly.
  • the internet data center may utilize a tiered response fire security system consisting of, for example, a FM200 primary suppression system and an integrated dry-pipe suppression system as a backup.
  • a FM200 fire suppression system may be described as a Halon alternative agent uses to protect essential applications traditionally protected by Halon 1301. This agent has many similar characteristics to Halon 1301 and is safe in normally occupied areas.
  • the primary fire suppression system may be implemented using, for example, multiple independent FM200 suppression systems equipped with early warning detectors that monitor the air for smoke or hazardous fire-related gases. If the system is triggered, an audible and visible alarm may be activated in the data center to notify personnel to evacuate the area before the FM200 is discharged. Alerts may be concurrently activated at security and local fire departments.
  • a secondary fire suppression system may be implemented using a dry pipe sprinkler system with high-heat heads. This may be a backup system for the primary and may not activate unless the primary fails.
  • the activation of the primary system proactively triggers the dry pipe system to charge the distribution pipes with water.
  • the sprinkler system may be activated in the area affected by the fire.
  • the high-heat fuse in the sprinkler nozzles inhibits the release of water in each nozzle until the temperature reaches 286 degrees.
  • Each high heat head may activate independently so that water is released in the immediate vicinity of the fire.
  • This primary and secondary fire suppression solution also protects the internet data center's mechanical, telecom, and computer support areas. The administrative offices and common areas may be protected by standard wet pipe sprinkler systems.
  • the power protection systems may provide completely separate and redundant grids from diesel generators to internal power supplies of the servers, storage, and network hardware.
  • the facility may be located, for example, in the same utility power grid as an airport (e.g., the Orange County Airport). This provides a higher than normal level of grid dependability because of the need of the community to provide uninterrupted power to the airport. To date, there have been no intentional or accidental interruptions in this grid.
  • the facility may provide facilities for, for example, ten separate, two (2) megawatt diesel generators to be phased into service as power utilization increases, while initially there may be seven (7), two (2) megawatt diesel generators deployed with three generators online in a N+1 redundant configuration.
  • the internet data center may maintain fuel (e.g., 90,000 gallons) on-site stored in underground tanks. This system may provide ten (10) days of continuous power operation at the full capacity load of the site without refueling.
  • UPS Redundant Uninterruptible Power Supply
  • UPS systems may be installed to provide clean regulated power in the event of any loss of utility power, and to provide that power until the generators come online.
  • the UPS systems in place may provide twice the full capacity load of the entire site so that all critical and ancillary systems are protected.
  • These systems and their support infrastructures may be designed to scale with the generators.
  • the internal power distribution grids consist of redundant sets of A-side and B-side transformers, UPSs, power distribution units, and power distribution circuits so that the power protection system provides true redundancy end-to-end.
  • Each server rack and Storage Area Network (SAN) frame utilizes multiple power distribution circuits evenly distributed between the A-side and B-side distribution systems.
  • Each server, router, switch, firewall or other device may contain at least two power supplies each connected to a different A-side or B-side Power Distribution Unit (PDU).
  • PDU Power Distribution Unit
  • the devices that were not available with internal redundant power may be deployed as redundant pairs so that the primary and secondary unit is powered by separate PDUs. This implementation ensures the availability of redundant power to all systems.
  • external power to internal power distribution units may be available 100% of the time.
  • redundant air handlers and coolers may provide target humidity and ambient mom temperatures for each zone in the internet data center.
  • the air handlers and coolers may be deployed in an N+1 redundant configuration.
  • Supply air may be ducted to the data floor under the raised floor and may be forced up through the server rack where extra cooling is needed.
  • the raised floor may be designed with a 42 clearance above the sub-floor so there is no risk that cables, cable trays, and conduit growth would restrict air flow.
  • the enterprise spatial system maintains a private, secure, and redundant network inside and outside of firewalls.
  • the internal network and the external Wide Area Network (WAN) are fully meshed and redundant networks (e.g., powered by products from Cisco corporation). All production services exist on high-speed DS3 feeds provided by, for example, InterNap with Border Gateway Protocol (BGP) routing.
  • BGP Border Gateway Protocol
  • DS3 refers to a 45 Mbs connection.
  • the Digital signal X is based on the ANSI T1.107 guidelines.
  • DS0 is the base for the digital signal X series.
  • DS1 used as the signal in the T-1 carrier, is 24 DS0 (64 Kbps) signals transmitted using pulse-code modulation (PCM) and time-division multiplexing (TDM).
  • PCM pulse-code modulation
  • TDM time-division multiplexing
  • DS2 is four DS1 signals multiplexed together to produce a rate of 6.312 Mbps DS3, the signal in the T-3 carrier, carries a multiple of 28 DS1 signals or 672 DS0s or 44.736 Mbps.
  • BGP may be described as a protocol for exchanging routing information between gateway hosts, each with their own routers. BGP is often the protocol used between gateway hosts on the Internet. The routing table contains a list of known routers, the addresses they may reach, and a cost metric associated with the path to each router so that the best available route is chosen. Hosts using BGP send updated router table information when one host has detected a change.
  • This combination allows enterprise spatial system to manage the way the world sees the routes to the secure data facility to provide the highest level of external routing performance to customers.
  • the WAN and Internet feeds installed at each secure data center are private point-to-point lines owned by enterprise spatial system and dedicated to enterprise spatial system services.
  • this network is not implemented on a co-located network and no other company shares any portion of the network.
  • Network devices there is no single point of failure.
  • Network devices core switches, border routers, segment routers, load balancers, firewalls, and VPNs are deployed in redundant pairs with validated failover performance. Worst-case recovery time during a redundant pair failover was confirmed at two (2) pings, best case was invisible.
  • the WAN segments at the primary site utilize redundant DS3 point-to-point connections to separate InterNap Private Network Access Points (PNAPs) in other locations (e.g., Los Angeles Calif. and Anaheim Calif.) to ensure continuous high-speed service in the event of a local disruption.
  • PNAPs InterNap Private Network Access Points
  • Each DS3 includes a separate Class C address space and real-time failover is managed through BGP implemented on Cisco 7200 Series Internet Routers.
  • a Class C Address Space refers to the address space of 254 unique addresses and usually refers to external address space provided by Internet service Providers.
  • the enterprise spatial system manages BGP routing rules and maintains private InterNic ASN numbers to ensure the security and reliability of this service.
  • An Autonomous System Number (ASN Number) is provided by InterNic and the Amerimay Registry of Internet Numbers (ARIN).
  • Autonomous systems are a group of IP networks that adhere to a single routing policy and that have a globally unique Autonomous System Number (ASN) in order to exchange exterior routing information and to identify the system itself.
  • ARIN assigns ASNs to organizations for their use in exchanging information with other autonomous systems.
  • FIG. 104 illustrates an internet connectivity diagram 10400 in accordance with certain implementations of the invention.
  • FIG. 105 illustrates a system architecture 10500 in accordance with certain implementations of the invention.
  • the enterprise spatial system maintains a third Internet feed via, for example, SBC/Sprint, as backup.
  • This provides an optional dual-entrance and dual-path OC-12 access to the Internet scalable to OC-192 capacity.
  • This feed fully provisioned and terminates in the secure data facility network racks but is not connected to the border routers.
  • OC-12 refers to Optical Carrier level (OCx) 622.08 Mbps.
  • the Synchronous Optical Network (SONET) includes a set of signal rate multiples for transmitting digital signals on optical fibre.
  • the base rate (OC-1) is 51.84 Mbps.
  • OC-192 refers to Optical Carrier level (OCx) 10 Gbps.
  • the production system internal network is implemented on core Cisco 6509 switches providing a high-speed switched gigabit foundation with high speed Layer 3 routing integrating into the switch.
  • This system hosts architecture of secure multi-tiered server segments, Demilitarized Zones (DMZs), and border segments, each providing redundant network paths for all servers and network devices.
  • a Demilitarized Zone (DMZ) may be described as a computer host or small network inserted as a neutral zone between a company's private network and the outside public network that prevents outside users from getting direct access to a server that has company data.
  • the enterprise spatial system utilized dedicated hardware firewalls on the border of all networks.
  • redundant Cisco PIX 525 firewalls may be utilized at all sites.
  • Firewall routing rules include inbound and outbound access restrictions. All network addresses are translated with NAT (Network Address Translation). NAT may be described as the translation of an Internet Protocol address (IP Address) used within one network to a different IP address known within another network. All internal segments exist on non-routable private address space. All firewall system logs are retained on dedicated system log hosts. All admin access is authenticated and logged by a Terminal Access Controller Access Control System (TACACS). That is, TACACS is implemented to authenticate administrative access to all network devices and records the commands executed by administrators.
  • TACACS Terminal Access Controller Access Control System
  • the firewalls may be licensed with 3DES (data Encryption Standard) encryption providing an additional option for encrypted tunnel Virtual Private Network (VPN) connectivity.
  • 3DES data Encryption Standard
  • the production site core switches are built on Cisco Catalyst 6509s to provide multi-layer switching, gigabit scalability, and high availability.
  • the core switches are configured with sets of gigabit fibre and 100 Mbps ethernet blades. All servers have redundant teamed Network Interface Controllers (NICs) and all operational servers have multi-homed gigabit fibre connections. Support and management servers are connected to multi-homed 100 Mbps segments.
  • NICs Network Interface Controllers
  • the Cisco Catalys 6509s include Layer 3 routing modules integrated into the high-speed backplane of the switch.
  • the tiered architecture of the production server cluster is implemented on these routers.
  • the Web Servers, Applications Servers, Map Servers, and data store cluster each have dedicated segments with access restrictions between segments. This provides the foundation for a concentric ring security model implemented around the core data repositories.
  • Border routing may be implemented on Cisco 7200 Series Internet Routers, with private DS3s terminate into each of these routers. Private Inter-Corporate segments and dedicated WAN interfaces may be implemented on Cisco 3640 Routers.
  • the switches and routers selected include a fully modular design with over 100 modular interface options. This design selection provides rapid scalability and flexible point-to-point connectivity options to customers. In certain implementations, the network infrastructure supports scaling to 4 ⁇ the current server deployment.
  • the switches and routers in the internet data center may be dedicated to production servers and may not be shared to provide or support enterprise spatial system corporate infrastructure.
  • a load balanced server farm may be implemented on redundant Alteon Ace Director 180e load balancers with gigabit interfaces connected directly to the 6509 switch segments.
  • the VPNs are Nortel Contivity VPNs. This provides persistent inter-corporate connection options including IPsec, authentication header (AH), encapsulating security protocol (ESP), and Internet key exchange (IKE).
  • Nortel Contivity VPNs may be deployed in all data centers providing emergency management access and a backup to dedicated connections.
  • Core secure data facility network may be available to customers 100% of the time.
  • the enterprise spatial system's server architecture is built on a SunONE solution.
  • Sun Solaris iPlanet Web and application Servers, Veritas Clustering, and Oracle Enterprise DB deployed on retail Sun, Hitachi, Brocade, and StorageTek hardware.
  • These systems may be deployed in an nTier design with each tier in a protected A virtual (or logical) LAN (VLAN).
  • a VLAN may be described as a local area network with a definition that maps workstations on some other basis than geographic location (e.g., by department, type of user or primary application).
  • the virtual LAN controller may change or add workstations and manage load-balancing and bandwidth allocation more easily than with a physical picture of the LAN.
  • the nTier design allows services to be distributed to dedicated servers so that a specific tier may be expanded independently of other tiers and provides a framework of layers of security around the data store protecting customer data.
  • the tiered architecture includes, for example: front tier Web and portal servers, application servers, map servers, and data store servers.
  • server code is implemented in a stateless design.
  • stateful means the computer or program keeps track of the state of interaction, usually by setting values in a storage field designated for that purpose, while sateless means there is no record of previous interactions and each interaction request has to be handled based entirely on information that comes with it. In other words, there is no recorded continuity.
  • Each communication is discrete and unrelated to those that precede or follow.
  • An easily expandable server farm is an inherent benefit in stateless server architecture. Because no transaction retains state, the transactions may be spread across multiple servers in a tier. Thus, any number of servers may be deployed into a tier. Increasing processing power involves nothing more than the procurement and deployment of additional servers.
  • Tiers or servers are expanded when peak loading would exceed, for example, 50% saturation of any resource when one server in the farm is inoperative. This operational policy ensures crisp application response during peak load even when failures occur.
  • the enterprise spatial system is well aware that expansion in a 24 ⁇ 7 online operation takes substantial advance planning. All prudent steps have been taken to ensure that expansion of the infrastructure may be performed with very little impact or with no external visibility.
  • the front tier sits behind firewalls that restrict inbound traffic to ports 80 and 443 and block outbound traffic.
  • the Web tier serves HTML requests and runs no services that access data.
  • the Web tier may initiate communication with the next tier, the Application Server tier, and this may occur on one port dedicated to Application Server requests. This process continues through each tier so that a breach from the front tier to the Data store tier, if possible, is expected to be a time-consuming endeavor. This time is enough for the intrusion detection systems to activate an effective response.
  • operational servers including Web, Application, Map, and Data store are deployed in load-balanced farms or clustered for failover purposes.
  • Support servers such as backup and monitoring servers, are deployed in redundant pairs.
  • servers are deployed with hot-swappable boot drives in RAID1 or RAID5, redundant teamed Network Interface Controllers (NICs), redundant load-balanced Host Bus Adapters (HBAs), and connected to 2 or 3 power supplies.
  • Operational servers may also run multiple Central Processing Units (CPUs).
  • CPUs Central Processing Units
  • load balanced tiers ensure that all inbound requests are routed to an available server. This includes inbound HTML requests and tier-to-tier application level requests.
  • the load balancer also performs health checks on each server in the farm and disables traffic to any server failing to respond. This turns a complex distributed processing system into a fault-tolerant environment and reduces the chance that a customer is impacted by the failure of an individual server.
  • load-balanced tiers Another benefit of load-balanced tiers is operational control of the transaction traffic in the site.
  • the site may be split into on-line and off-line systems during deployment of system upgrades. This allows the operations group to deploy upgrades and security patches with no risk to the operation of the on-line servers and no external visibility.
  • all tiers are load balanced except the Data store tier, which is clustered for dynamic fail-over. This is due to the unique requirements of writing into a transactional data store.
  • the Data store cluster may be implemented under a Veritas Cluster Server.
  • the Veritas Cluster Server monitors cluster resources and their dependencies, including Solaris services and Internet Protocol (IP) address. If any resource becomes unavailable, a failover occurs automatically and transaction processing is continued using a standby node.
  • IP Internet Protocol
  • the Web and Portal Servers authenticate site access and serve HTML requests in a secure front tier segment.
  • the enterprise spatial system prohibits any service that would require data store access into the front tier Web servers. From this network segment, no route to the data store segment exists so that no connection to data may ever be established. All data access is handled by, for example, J2EE application Servers.
  • J2EE may be described as a Java 2 Platform, Enterprise Edition, which is a Java platform designed for the mainframe-scale computing typical of large enterprises.
  • the Web Servers may be implemented on a load balanced farm of Sun SunFire 280R Servers running hardened Solaris 8 and SunONE iPlanet Web Server.
  • the Application servers provide a J2EE compliant application service layer. Business logic and data access is controlled from this tier.
  • the Application servers may be implemented on a load balanced farm of Sun SunFire 280R Servers running hardened Solaris 8 and SunONE iPlanet application Server.
  • the map servers provide dedicated raster and vector layer rendering with shared SAN volumes for high-speed rendering and transfer to the Web tier.
  • the map servers may be implemented on a load balanced farm of Sun SunFire V480R Servers running hardened Solaris 8 and customized enterprise spatial system and Environmental Systems Research Institute
  • the data store servers may be implemented on a clustered set of Sun 4500 Enterprise Servers running Oracle 8i Enterprise Edition, hardened Solaris 8, and Veritas Cluster Server.
  • the enterprise spatial system's storage architecture is built on a SunONE solution constructed of leading edge SAN and Tape software and hardware. All system software and hardware was selected and validated based on its system level performance and fault tolerance capabilities.
  • the SAN storage and switching systems were selected based on their bandwidth and capacity scalability, their redundant high availability architecture and their support for key software components including, for example, Sun Solaris 8 and SAM File System.
  • System hardware includes, for example, a StorEdge 9960 Large Scale SAN Storage Arrays, StorEdge Tape Library systems, Brocade Silkworm 3800 2 Gigabit Fibre channel switches and Emulux LP9002 2 Gigabit Fibre channel server host bus adaptors.
  • the enterprise spatial system SAN system hosts multiple file system volumes containing different datasets used by the various system servers in different ways.
  • the different client servers mount file systems volumes both in Read-Only and Read-Write mode depending upon use.
  • the volumes may contain imagery data, application software, data stores, and other types of enterprise datasets.
  • the volumes may be configured based on both the data contained in it and its intended application level use.
  • the enterprise spatial system SAN based file systems not only operate, but perform and scale in both normal operation and in all possible failure conditions in order to support the high availability architecture.
  • the enterprise spatial system SAN, switch, and network architectures are designed as high availability.
  • Each of the components between the requesting server and SAN hosted data element are redundant for fault tolerance and no single point of failure.
  • a benefit to redundancy is that it provides double bandwidth capacity for each server in normal operational mode. For example, a single server has effectively four (4) Gigabits of bandwidth to the SAN normally and two (2) Gigabit in failure mode.
  • the enterprise spatial system SAN storage software is SunONE QFS and SAM-FS file system and tape management software. This software was selected for its high performance and fault tolerance capability under high volume, transactional and clustered server loading. Additionally, the unique capabilities of universal storage virtualization allows for long term capacity expansion in any performance dimension and storage hardware configuration required.
  • QFS and SAM-FS allow for volume virtualization on any mix of on-line, near-line or off-line disk and tape storage. This includes any hardware vendor or physical topology configuration. All possible expansion models have been validated under performance loading and all failure conditions to operate and perform without impact to system operations.
  • the enterprise spatial system employs systems and network operations personnel to provide 24 ⁇ 7 ⁇ 365 continuous service operation.
  • Stringent security policies for infrastructure deployment, operations and management are standard practice. These polices protect customer data, system integrity, and corporate assets in this order of priority. These protections extend to the few trusted resources that have administrative access to systems. Access to the secure data facility is restricted to key members of the Systems and Network Operations Group.
  • the server, network, storage, and security infrastructure was designed and deployed by the Systems and Network Operations Group and enterprise spatial system architects.
  • the expertise required to manage and extend the service offering may be kept securely in-house.
  • Exclusively trusted enterprise spatial system personnel may manage the infrastructure and operations. No outside entity may be given any degree of access or visibility to any production or corporate infrastructure.
  • Support, routine, and preventive maintenance, and upgrades for infrastructure in the secure data facility are provided. This includes staging and certifying upgrades and security patches through QA/Staging/Production release process prior to deployment.
  • Network and telecommunications software at the secure data facility is installed, maintained, upgraded, and supported, including maintaining current IOS releases for switches, routers and firewalls. Additionally, coordination with made with local exchange and inter-exchange carriers to maintain agreed-upon performance standards and provide expanded connectivity.
  • Installation and maintenance activities are scheduled in regularly scheduled off-hour maintenance windows. Customers are notified promptly of any problems that might be expected to adversely affect service availability within established schedules. Maintenance or upgrades which require an externally visible service interruption are rare events and are generally limited to, for example, data store schema changes. When a maintenance or upgrade activity necessitates system downtime, these activities are scheduled at night during the weekend and continue until service is restored.
  • the enterprise spatial system's Systems and Network Operations Group is responsible for all on-going infrastructure development, planning, support, and maintenance.
  • the group works closely with customers to gather requirements and with vendors in order to offer new technologies and improvements.
  • This group keeps abreast of the latest technologies and specifications not only to provide maximum capabilities but also to remain consistent with all regulatory requirements.
  • new technologies, components, and solutions are defined, they are validated for their potential use before they are offered to customers.
  • External monitoring includes intelligent health checks that implicitly test the operation of all server tiers by executing special health check functions embedded in the front tier Web servers.
  • External monitoring runs in multiple locations to validate operation from multiple network providers. This ensures that enterprise spatial system has constant visibility and awareness of the service level that a customer might experience; and, increases ability to respond to any change, including changes which exist beyond network.
  • Various monitoring systems may be used.
  • the enterprise spatial system provides intrusion detection.
  • the intrusion detection utilizes Tripwire for Servers and Tripwire for Networks (Routers and Switches) to monitor systems for unauthorized changes and to ensure that all systems remain in their intended state.
  • Tripwire baselines a system configuration by reading system files and creating a hashed index of the system and application files. Tripwire then compares the baseline to the current system configuration at specified intervals. If any file has changed, Tripwire triggers and sends notifications immediately to the operations and security teams.
  • Tripwire for Servers monitors: production servers, system management servers, data transfer servers, backup servers, source code control and build servers, domain controllers, and exchange servers.
  • Tripwire also assures the integrity and security of routers, switches and firewalls by monitoring network devices and providing notification of changes to configuration.
  • Tripwire takes a snapshot of trusted baseline configuration files. Integrity checks are run periodically on network devices to determine if changes have been made. Any change in either the saved or running configuration triggers notifications.
  • Tripwire for networks monitors: firewalls, border routers, segment routers, and core switches.
  • a backup and recovery solution is provided.
  • enterprise spatial system's backup plan uses a combination of SAN, SAM-FS and Veritas Netbackup solutions.
  • SAM-FS provides real-time replication of SAN volumes to near-line storage. Veritas is used to create the backups destined for off-site storage and to maintain images of server system partitions.
  • All critical data which includes Oracle data files and backups, exist on SAN volumes and are constantly replicated to tape by SAM-FS. All vector data, project data, and customer data is contained in the Oracle data store.
  • the Oracle data files are periodically backed up to a separate, dedicated backup volume by Oracle's Recovery Manger (RMAN).
  • RMAN Oracle's Recovery Manger
  • RMAN's ability to stream multiple channels of data files is used to optimize both the backup process time and enterprise spatial system's Mean Time To Recovery. Furthermore, RMAN compresses data files, backing up only sections of the files that actually contain data and stores the data in a secure format.
  • SAM-FS ensures that the backups are protected by near-line storage minutes after the file is written to SAN.
  • Veritas ensures that tertiary backups are vaulted in off-site storage.
  • the enterprise spatial system maintains off-site vaulting of data (e.g., at Iron Mountain).
  • the storage plan Includes:
  • rolling alternate backups maintained on-site in near-line tape library For example, there may be fourteen weeks of rolling weekly backups stored off-site to provide point-in-time copies of data for each week in the previous quarter.
  • One backup per quarter may be stored off-site, which persists for one year, to provide point-in-time copies of data for each quarter in the previous year.
  • One backup per year may be stored off-site which is not destroyed.
  • the application services may be accessed through the portal service and may be co-branded to a client's corporate look-and-feel.
  • the risk manager application service may include certain specialized screens for ring analysis, while other application services may be specialized extensions of Web services, reporting services, and admin services.
  • the portal application service is the conduit by which users are granted access to individual application services.
  • the portal service provides the user with, for example: login and authentication services, portal home page with role based application service menu options, and session based access to application service sites.
  • user level personalization may not be required beyond role based menu options.
  • any personalization information passed back from the authentication mechanism may be used as long as it is not stored in the portal LDAP data store.
  • the user may connect over a private branch office connection between an Intranet and the enterprise spatial system data center directly to the portal URL.
  • direct access from the Internet by users is not allowed.
  • the users use the enterprise spatial system standard login page and authentication mechanism co-branded to their corporate Web style sheet.
  • Once a user provides authentication criteria the authentication criteria is verified against the LDAP data store and, if the provided authentication criteria matches, an associated user session is created for the user.
  • the user session, associated user role and any available personalization information is returned to the portal system to then help direct the generation and presentation of the main portal page for that user.
  • the authentication criteria may be a standard username and password restrictions.
  • Each user is identified in the LDAP and enterprise spatial system administration system as a combination of a company and user name. This ensures that user names are unique within a given company, but may be reused by other companies. This means that the list of unique companies configured in the admin system are distinct.
  • Usage restrictions may be applied at the application service level. This means that any valid user may authenticate into the main portal page without being rejected due to lack of available licenses.
  • license level usage rights may be applied against the application services accessed from the main portal page.
  • Each link on the main portal page directs the user to an application service.
  • the application services that the user has rights to based on the user's role are displayed for selection.
  • a usage restrictions check is made to ensure that there are currently sufficient user licenses available to access that particular application service. If not, the user is presented with a “Licenses exceeded. Please try again later.” message.
  • FIG. 106 illustrates a table 10600 of application services in accordance with certain implementations of the invention.
  • the user roles work in conjunction with admin application enforced access control on both functionality and data, portal enforced role based UI control, and database enforced user account access control.
  • the admin application may be used to configure what roles have access to what application services and over what user account that user gets access to data.
  • Application services configured using the admin application service may define what functionality is exposed by the portal to the user and then what data and function level access control is enforced on a click-by-click level once the user is logged in.
  • Physical roles may be configured with varying access rights.
  • FIG. 107 illustrates a table 10700 of portal application service assignments in accordance with certain implementations of the invention.
  • the co-branded portal may be configured with a screen flow that is used to navigate between each of the application services.
  • FIG. 108 illustrates a top-level portal site map 10800 in accordance with certain implementations of the invention.
  • Portal site map 10800 illustrates application service links from the main page and the general areas of functionality provide under each.
  • FIG. 109 illustrates a screen 10900 of a set of features available for the corporate risk manager user in accordance with certain implementations of the invention.
  • the user may link directly to any of the external application service sites and additional portal menu pages that they have access to.
  • the user's usage restrictions for that application service are checked, and the user is allowed to proceed if the usage limit has not been exceeded. If no free users are available, the user may be notified and may remain on the portal menu. The user is free to go into any application service that they have a menu option for and that has not yet reached its usage limit.
  • a successful link to an application service carries session and user profile information established when the user completed the authentication into the main portal menu page. Subsequent application service menu pages and sites may be co-branded in a manner consistent with the main portal menu page.
  • the banner header for portal menu pages for the portal may be co-branded in the same manner.
  • the top left corner may display the client's logo and serves as a click-point to return to the main portal menu page.
  • Each menu screen displays a screen title appropriate for the particular menu's contents.
  • the Powered By (e.g., enterprise spatial system) logo is shown in the top right of the screen.
  • the color schema and boarder bitmaps show the client's corporate color scheme.
  • User personalization on the main portal menu page includes the user's name. This information is provided back to the portal, along with the user role, when the authentication process is complete, and the user session is officially created.
  • the menu options displayed to the user are represented by both an icon and text description.
  • the icon and text may show a slight visual shift during mouse over so the user is aware of the click location for that particular menu option.
  • the menu options that the user is allowed to see based on the user's role are displayed and accessible.
  • the risk manager link allows the user to go to the main application co-branded and customized as the risk manager application service.
  • the underwriter link allows the user to go to the underwriter application service co-branded and customized on enterprise spatial system Web services integrated with the client's data.
  • the reporting link allows the user to go to the reporting application service.
  • the reporting application service may be additional portal page co-branded with links to a customized site built on the enterprise spatial system reporting service and integrated with the client's data store and associated Relational On-line Analytic Processing (ROLAP) drill-down structures.
  • ROIAP Relational On-line Analytic Processing
  • the setup link allows the user to go to the admin application service.
  • the admin application service may be an additional portal page co-branded with links to the enterprise spatial system admin services and a customized data store administration site.
  • the reporting application service may be made up of a portal reporting menu page with parameterized links that connect to the customized enterprise spatial system reporting service site.
  • This site may be a preconfigured set of report templates that allow the user to select one of three (3) report drill-down branches.
  • FIG. 110 illustrates a screen 11000 that shows the reporting menu page and its associated links in accordance with certain implementations of the invention. Once one of the three links has been selected, the subsequent report screens are generated by the reporting service based on data and parameters selected by the user from drill-down context.
  • the total book of business link allows the user to go to the total book of business drill-down report.
  • the link may contain the preconfigured report template identifier as a parameter for the reporting service to then generate the report.
  • the new and renewed business link allows the user to go to the new and renewed business drill-down report.
  • the link may contain the preconfigured report template identifier as a parameter for the reporting service to then generate the report.
  • the policy renewal link allows the user to go to the policy renewal drill-down report.
  • the link may contain the preconfigured report template identifier as a parameter for the enterprise spatial system reporting service to then generate the report.
  • the admin application service may be made up of a portal administration menu page with links that connect the user to either an enterprise spatial system admin service site or a customized admin site.
  • the enterprise spatial system admin service site provides the user with access to the customer delegated administration screens that allow the user and role administration for that particular customer.
  • the client's customized admin site provides the user with the ability to manage data store setup tables in three (3) groups: events, landmarks and business tables.
  • FIG. 111 illustrates a screen 11100 that shows an ESS admin menu page and its associated links in accordance with certain implementations of the invention. Once one of the four links has been selected, the screen flow branches to one of the two administration sites.
  • the setup event types link allows the user to go to the event type list administration screen and view/modify an event type's settings. View and modification of the event types, total loss and ad hoc, are allowed.
  • the setup landmark link allows the user to go to the landmark list administration screen and view/modify landmark settings. In certain implementations, adding landmarks to the landmarks list is done through the risk manager application service ring analysis function, rather than from landmark setup.
  • the setup business tables link allows the user to go to the business table administration screen and add/modify entries for the key supporting business table in the data store.
  • the administration link allows the user to go to the admin service site. In order to manager users and roles, the user will have to authenticate with a higher level of authentication criteria.
  • the risk manager application service is a specialized, insurance industry application.
  • the enterprise spatial system service provides a co-branded user interface with data presentation and ring analysis features configured for risk manager users to use as part of their business workflow.
  • the main risk manager application service screen is an application main screen that is displayed upon selection of the risk manager option in the main portal menu page.
  • the risk manager is licensed to clients under a named user license model, which means each user has a license reserved for them and is not rejected for lack of licenses when attempting to access the application service.
  • the admin user may be notified and denied if the maximum licenses have been exceeded upon attempting to assign a new user to a role that includes the risk manager application service.
  • the main screen contains a set of adjustments for each client, for example: co-branding, layer, search by, point n′ view, fill report and ring analysis function configurations.
  • the standard application and tools in the screen layout may be adjusted to show corporate standards for banner headers, logos, and color scheme.
  • FIG. 112 illustrates a screen 11200 in accordance with certain implementations of the invention.
  • FIG. 113 illustrates a table 11300 of data layers in accordance with certain implementations of the invention.
  • the policy location Zoom scale of 1:25000 is an estimate and may be adjusted based on view of Manhattan in New York.
  • FIG. 114 illustrates a table 11400 of landmark location fields in accordance with certain implementations of the invention.
  • FIG. 115 illustrates a table 11500 of policy location fields in accordance with certain implementations of the invention.
  • both the landmark locations and policy locations layers support all available data store view columns in their respective Full reports.
  • This risk manager application service may be used for ring analysis on individual landmark locations and their ring-by-ring relationship to policy locations.
  • the ring analysis process is used to find a set of policy locations within a given proximity to the selected landmark location and then generate PML data on which the risk manager does analysis and policy detail drill down.
  • the PML value determination process takes into account the set of policy locations in a given landmark's event ring zones before assigning a PML value to any one of the individual policy locations in the set. Therefore, any one parameter that may affect the number and position of policies included in the evaluation causes the PML process for that given landmark to be reassessed.
  • PML procedures are used by the risk manager application service to generate PML values.
  • the PML procedures include a session-based option to enable the generation of PML data from a given landmark on-demand or in an ad hoc manner.
  • the ad hoc PML process supports ring analysis on a single landmark location, and associated policy locations, where one or more of the ring analysis parameters are different from those used in the periodic (e.g., monthly) ETL process.
  • Two parameters that may differ between the periodic ETL and on-demand ad hoc processes are the location of the landmark and the number and/or dimensions of rings used in the ring analysis. Both parameters affect the list of policy locations that are included in the PML calculation process.
  • the ring analysis process allows for either of the two parameters to be adjusted in any combination desired and the associated PML data and drill-down reporting to be generated and provided.
  • FIG. 116 illustrates a ring analysis wizard screen 11600 in accordance with certain implementations of the invention.
  • the ring analysis process is implemented with the wizard based process when the ring analysis function is selected using a tool bar button or an option from the sub-menu option under the business analysis menu.
  • the forward and back tools do not display ring analysis and projects do not save ring analysis.
  • the ring analysis wizard When the user selects the ring analysis function, from either the tool bar or menu, the ring analysis wizard is launched and displays the first screen H 1100 in the wizard for center point selection.
  • the center point selection screen may be a modal dialog that provides the user with three (3) radio button options in which to select the ring analysis center point.
  • the default radio button selection may be Option 1: Select a landmark.
  • the ring analysis wizard screens may be co-branded in a manner consistent with the client's corporate intranet.
  • the title, banners, Powered by (e.g., enterprise spatial system) logo may be consistent with the main portal menu page layout.
  • the main screen frame may be appropriately titled and follows with a general description of the reason and use for the center point selection screen.
  • the select a landmark option allows the user to select one of the landmark locations that are found in the landmark locations layer.
  • the landmark location dropdown may be populated will the names of the landmarks from the landmarks layer, plus one blank entry.
  • the default selection may be the blank entry, and select a landmark may be the default selected Radio Button.
  • the Enter an Address option allows the user to manually enter an address of a location for the landmark in question. This address may be geocoded on the fly and any error in the geocoding process reported to the user to influence correction in the address data to allow eventual successful geocoding.
  • the Street Entry field is a text data entry field that is, for example, 64 physical characters, 40 displayable characters and horizontally cursor scrollable.
  • the Street 1 Entry may have a minimum of 3 characters and may not contain a percent character ‘%’. The default is empty.
  • the City Entry field is a text data entry field that is, for example, 50 physical characters, 30 displayable characters, and horizontally cursor scrollable.
  • the City Entry may have a minimum of 3 characters and may not contain a percent character ‘%’. The default is empty.
  • the State Dropdown may be populated with the standard 50 US states plus one blank entry to allow the user to select a state to include as search criteria in the Find Company query. The default is empty.
  • the ZIP Entry field is a two-part text data entry field.
  • the first ZIP Entry may have a minimum of 5 characters and may not contain a percent character ‘%’.
  • the first ZIP entry is separated from the second box by a - (hyphen). and the ZIP+4 extension is optional. If this second field is completed, however, it includes 4 characters and may not contain a percent character ‘%’. The default is empty.
  • the Enter a Latitude and Longitude (e.g., in decimal degrees) option allows the user to manually enter the location coordinates for the landmark in question. This coordinates may be verified as true latitude and longitude values for the 50 United States. Errors in the entry may be reported to the user for correction.
  • the Latitude Entry is a numeric entry field, and the default is empty.
  • the Longitude Entry is a numeric entry field, and the default is empty.
  • the Continue Button closes the dialog and displays a next ring analysis wizard screen (i.e., screen 2 dialog). If the Radio Button Option 4 was chosen, the manual selection dialog is displayed prior to the screen 2 dialog. The parameters entered in the manual selection map view (also referred to as screen 1 dialog) are carried along to the next wizard screen.
  • the Cancel Button closes the dialog, discards the selections and entry data, and returns the user's context to the main application screen.
  • FIG. 117 illustrates screen 2 11700 in accordance with certain implementations of the invention.
  • the wizard displays the ring analysis screen from which the user may select the ring analysis details to use.
  • the ring analysis parameters screen displayed is defined as follows: the analysis details selection screen may be a modal dialog that provides the user with the ability to select an event type with a preconfigured set of ring dimension and the layer that the ring analysis may be performed against. Additionally, the user may readjust the ring number and dimensions if the ad hoc event type is selected.
  • the analysis details frame contains the elements that the user may configure related to the ring dimensions and target ring analysis layer. These parameters are controlled by the event type dropdown and target layer selection dropdown.
  • the total loss is a data store driven event and may be referred to as building collapse.
  • the event type parameters are populated from the event_type and event_type_zone tables in the data store. Both of the event type parameter sets may be configured by the admin user using the admin application service.
  • the default value displayed in the event type dropdown is the ad hoc option.
  • the ad hoc event type option contains default ring dimensions that were entered using the admin application service. The user may choose to keep those parameters or override them with new ones. The user may specify the number of rings and the distance from epicenter for each of those rings. The changes made by the users are maintained during the ring analysis session and then discarded after.
  • the user may not select more rings than are available with the ad hoc event type due to the fact that the user may not specify damage rates per coverage type for rings that are added.
  • the damage rates are required to be able to generate the PML values that are the basis of the analysis summary and PML drill-down.
  • the user contacts a user that has access rights to the admin application service and has the admin user add the additional rings to the ad hoc event type as the defaults that may be shown in this screen.
  • the admin user may then add the required damage rates so that the PML calculations may be run. If a user inputs into the ad hoc, chooses total loss, then goes back, the original inputs for ad hoc may be gone.
  • the total loss event type option may contain default ring dimensions that were entered using the admin application service. Unlike the ad hoc option, the user may not change any of the ring dimensions for the total loss option.
  • FIG. 118 illustrates a screen 11800 in which the Ring Attributes section is disabled in accordance with certain implementations of the invention. When the total loss option is selected, the Ring Attributes section of the dialog frame is disabled for user entry as shown in FIG. 118 .
  • the Rings to Select dropdown contains the layer that the ring analysis option may be performed against.
  • the policy location layers are displayed in the dropdown.
  • An attribute on the layer configuration indicates that the layer is available for ring analysis.
  • the default value displayed in the Use Rings to Select dropdown may be the most current policy location Layer available.
  • the user If the user had selected an existing landmark on screen 1 and then selects the total loss event type and finally chooses a policy location layer that is not the current layer, the user is indicating that the user wants to look at a historical landmark ring analysis. In this case, the event type Ring Attributes from the matching batch number are reselected, and the screen is updated to reflect the total loss parameters at that time.
  • the selection may be considered a temporal ad hoc and the policy location and event type data from that historical batch may be used.
  • the Ring Attributes frame contains elements that control the ring analysis ring dimensions. These attributes include the Numbers of Rings, Unit of Measurement, and Spacing from Center elements. Each element controls a different aspect of the ring dimension and is mapped to the elements in the event_type_zone table in the client's data store.
  • the Number of Rings dropdown may be populated with a number from 1 to 10.
  • the number of event_type_zone records associated with the event type is counted and then the default value set to that number in the Number of Rings dropdown.
  • the default value displayed in the Number of Rings dropdown is the number of rings defined in the event_type_zone table for the ad hoc event type.
  • the Unit of Measurement dropdown has two different values in populated in it: Feet and Miles.
  • the dropdown is set to the measurement_units field in the event_type table in the client data store when that particular event type is selected.
  • the default value displayed in the Unit of Measurements dropdown may be the measurement_units defined in the event_type table for the ad hoc event type.
  • the Spacing from Center entry elements contain the distance from the landmark center point at which to draw each consecutive ring as specified by the Number of Rings dropdown.
  • the number of rings that are specified are displayed as entry boxes. Each entry element is labeled with its associated ring number.
  • the Continue button is selected, the data elements entered are checked for validity. For example, each consecutive ring dimension is expected to be larger than the previous and the last ring does not exceed 3 miles.
  • the values in the radius_in_feet field of the event_type zone table are stored in feet.
  • the value entered in the Spacing from Center entries are converted to and from feet based on the Unit of Measurements selection.
  • the default value displayed in the Spacing from Center entries are the values defined in the radius_in_feet field of the event_type_zone table for the ad hoc event type.
  • FIG. 119 illustrates a screen 11900 with the expanded Show Options link in accordance with certain implementations of the invention.
  • the Show Options link allows the user to see an additional pair of user inputs that include a center point Name entry, a center point icon selection dropdown, icon color drop down, and ring color drop down.
  • the user may enter the name of the selected landmark center point, assuming it was not picked form the landmark layer dropdown, and pick the particular icon desired to represent the center point or epicenter of the ring analysis.
  • the default name is either blank or whatever the name of the existing landmark is.
  • the default icon is a yellow star with a thin black border.
  • the Show Options link will change to Hide Options when the options are displayed.
  • the Back Button closes the dialog and then redisplays screen 1 of the wizard and returns the user's context back to the landmark center point selection.
  • the previously selected and entered elements from screen 1 are reestablished to the point where the user had clicked Continue on that screen.
  • the Continue Button closes the dialog, runs the ring analysis Process with the selected parameters, and then displays a ring analysis results wizard screen 3 .
  • the Cancel Button closes the dialog, discards the selections and entry data, and returns the user's context to the main application screen.
  • the ring analysis process takes the parameters selected by the user and passes them to the ring analysis stored procedure that, if required, performs a spatial query on the selected layer and then passes the results to the PML stored procedure provided by the client.
  • the result of the ring analysis is passed to the ring analysis Results and Summary screen in the main application. This process allows the user to immediately see the results plotted on the map display, view PML totals in the Analysis Summary view, and then drill down through multiple aggregate levels to policy location details.
  • FIG. 120 illustrates a table 12000 of different scenarios that may be requested by a user in accordance with certain implementations of the invention.
  • the required data is copied from the dataset that was generated during the periodic ETL process instead of generating it on the fly.
  • the data copied includes the set of policy locations identified from the spatial ring query and the associated PML value calculated for those locations on a coverage-by-coverage basis.
  • the ring analysis stored procedure may then perform the spatial query and use the client's stored procedure for the PML values.
  • the process of generating the results for display may take some time. The user may be notified to wait for the results.
  • landmark CAP may be equal to total the PML for a new landmark
  • landmark PML adjustment factor may be zero for a new landmark
  • maximum number of rings limited to ad hoc event type
  • damage rates may be from ad hoc event type.
  • the ad hoc ring analysis Ring Dimensions and resulting ring analysis results may be temporary and may not be saved outside of the ring analysis session.
  • the ad hoc event type parameters (other than Ring Dimensions) may be administered using the admin application service and included as part of the existing landmark and total loss event type configurations during the next periodic batch ETL process.
  • the ring analysis data and PML information may be stored in a set of Session based tables that allow the user to maintain the state of the results between the ring analysis screens and the Analysis Summary and PML Drill-Down screens.
  • This session data may be cleared before each ring analysis is run and also when the session is cleared by the user logging out or the session cleanup process runs.
  • FIG. 121 illustrates a ring analysis Results and Summary screen 12100 in accordance with certain implementations of the invention.
  • the ring analysis Results and Summary screen is displayed once the PML generation process is complete and the associated data is available to display.
  • the wizard displays the results including the map view with the ring analysis along with the Analysis Summary report.
  • the ring analysis results are displayed in the main application with the center point, Rings and policy locations plotted on a Map Image frame as was configured prior to the ring analysis being initiated.
  • the Analysis Summary report is displayed on the right under the Map Summary information frame. Additionally, two buttons are provided at the bottom right of the screen: Save landmark and Drill-Down.
  • Save landmark may or may not be displayed depending upon the ring analysis parameters.
  • the Map Image frame contains a map image of the ring analysis results plotted over the top of the map view that was configured prior to the initiation of the ring analysis function.
  • the ring analysis results include the landmark center point, Rings, and Selected policy locations. The user may be zoomed into the landmark and is shown all rings plus, for example, 15% extra map area.
  • the landmark center point plotted shows the location of the center of the ring analysis that was selected in screen 1 of the wizard and be displayed with the icon selected using the Show Options link.
  • Ring dimensions selected in screen 2 of the wizard are plotted around the center point based on the specified distances.
  • ring pixel width may be 1.
  • the rings are displayed to the user by zooming and panning to the landmark, showing the outer most ring plus, for example, 15%.
  • the Selected policy locations that were identified using the spatial query stored procedure are then plotted as a selected set of points using the application standard presentation for selected points in a given layer.
  • the Save landmark button provides the user with the ability to save the center point of the ring analysis to be saved as a new landmark in the landmark layer.
  • the Save landmark button appears when the proper conditions are met and is displayed in the lower right of the screen beside the Drill-Down button as shown in FIG. 122 .
  • FIG. 122 illustrates a screen 12200 in accordance with certain implementations of the invention.
  • the user is presented the Save landmark button if the following conditions are true: the user has the rights to the admin application service; the user did not select an existing landmark from the landmark Layer as the center point; and he user selected the total loss event type. If any of the criteria required are not met, the Save landmark button is not displayed to the user, and the user is not allowed to save the landmark as a new landmark.
  • the setup landmark screen from the admin application service is displayed.
  • the Update button may be changed to a Save button, and the landmark may be inserted into the landmark layer.
  • the admin version of the screen allows the user to select an existing landmark and modify its parameters.
  • FIG. 123 illustrates a screen 12300 of a save landmark address example in accordance with certain implementations of the invention.
  • FIG. 124 illustrates a screen 12400 of a save landmark latitude/longitude example in accordance with certain implementations of the invention.
  • the input for landmark name does not need to be unique (e.g., City and State may be used to differentiate).
  • the address information is carried over from the ring analysis (disabled).
  • the latitude and longitude information is carried over from the ring analysis (disabled)
  • the user may input City and State information (as it is used to differentiate between multiple landmarks with the same name.
  • CAP default is 0 and user may change
  • PML default is 0 and user may change
  • CAP Breakout may range from a minimum of 0 to a maximum of 100, where, for example, four divisions may add up to 100%.
  • the record in the LANDMARK_EVENT_TYPE table holds the landmark CAP and the PML Adjustment Factor.
  • the table is also the Parent table to the LANDMARK_EVENT DIV CAP.
  • One record is inserted in the table, and no record is required for the ‘ad hoc’ event type.
  • latitude, longitude, and Geocode Status fields may be displayed below the address.
  • the Analysis Summary report frame contains a top-level report that provides the user with details about the ring analysis including, for example, ring dimensions, number of Liability, PML and Premium.
  • FIG. 125 illustrates a table 125 of landmark ring analysis totals in accordance with certain implementations of the invention.
  • FIG. 126 illustrates a table 12600 of landmark ring analysis by ring totals in accordance with certain implementations of the invention. If no policies are found within a ring, the ring information will include: the Ring Number (1), the Ring Radius (2), and the Total number of locations (3). For the Total number of locations and other fields no data may be displayed.
  • FIG. 127 illustrates a screen 12700 in accordance with certain implementations of the invention.
  • the Drill-Down button provides the user with the ability to link to the reporting application services and display the By Ring view of data for a single landmark location.
  • the data required for this report is stored in the session based ring analysis tables and allows the user to link through three (3) levels of drill-down screens to eventually get to the policy Detail data that is available directly from the screen using the Full report button.
  • the initial levels of drill-down include By Ring, By Ring By Coverage, By Ring By business Unit and finally policy Detail.
  • the Log Off button may be clicked upon to return to the portal Main menu and will log off the user from the system. If the user does not click the Log Off button, the session is cleaned-up by a process that clears their session after, for example, approximately 2 hours or when the user attempts to re-login. During re-login, if a session is shown to exist, the user may be prompted to close the other session. No two sessions may be allowed at any one time. The actual session is not cleared unit the user logs out of the portal menu.
  • the underwriter application service is a specialized, insurance industry application.
  • the underwriter application service is built on a Web services framework and provides a co-branded, limited screen flow user interface for client users to access these tools as part of their business workflow.
  • the underwriter application service is used to assemble a list of locations for a given company that the underwriter is considering writing insurance coverage policy(s) for.
  • the underwriter may select a set of business locations from a combination of both business data (such as Dun and Bradstreet data) queries and manual address entries to query against a data store of high-risk landmark locations.
  • the end result of the users' workflow may be a list of locations for a given company, where those that may be geocoded include a rating that indicates how close they are to a high-risk landmark.
  • This list is then exported and passed to the business managers and corporate risk managers to adjudicate any policies that are in question.
  • the business manager and corporate risk managers may use the risk manager and reporting application services to do further analysis in support of the decision process.
  • FIG. 128 illustrates an underwriter application service screen 12800 flow in accordance with certain implementations of the invention.
  • the underwriter application service is comprised of a location list screen and additional Business Data store (e.g., D&B) Search and Manual Address Entry dialog pop-ups to support the assembly of the location list.
  • additional Business Data store e.g., D&B
  • Search and Manual Address Entry dialog pop-ups to support the assembly of the location list.
  • FIG. 129 illustrates a main underwriter application service screen 12900 , which is a location list screen, in accordance with certain implementations of the invention.
  • the screen is displayed upon selection of the underwriter option in the main portal menu page.
  • one license is indicated as in use of the available (e.g., 200) concurrent users. As long as the user has not logged out or timed out, this user may count as one used license from the pool of 200 concurrent users.
  • the underwriter location list screen may be co-branded in a manner consistent with the client's corporate intranet.
  • the company logo may be clicked upon to return to the portal Main menu and will log off the user from the system.
  • the title, banners, and Powered by (e.g., enterprise spatial system) logo are consistent with the main portal menu page layout.
  • the Option1 Search D&B by Company frame is used to locate the name of a particular business that the user wants to select locations from.
  • the Company Name Entry field allows the user to enter the business name on which to search.
  • the user may enter a ‘Starts With’ string that may be a minimum of 3 characters and does not contain a percent character ‘%’. If there is no direct search match, the user is prompted with the following message ‘Company Not Found. Please try an alternate name.’ The default is empty.
  • the City Entry field is an optional field that allows the user to enter the city name to include as search criteria in the Find Company query.
  • the city name search if not omitted, is a full string search match, may have a minimum of 3 characters, and does not contain a percent character ‘%’. If there is no direct match, a second search may be made. If there are multiple matches, then an ambiguous name search dialog may be displayed. The default is empty.
  • the State Dropdown is an optional field that is populated with the standard 50 US states plus one blank entry to allow the user to select a state to include as search criteria in the Find Company query. The default is empty.
  • the Find Company Button initiates the Find Company Query by assembling the user data from the three data entry fields (Company Name, City and State) into a data store query, sending the query to the data store, and populating the results into the Company Selection dialog.
  • FIG. 130 illustrates a table 13000 of four combinations of user data entered for a Find Company Query in accordance with certain implementations of the invention.
  • Each of the different combinations represents a separate ‘where clause’ search against the business data (e.g., D&B) normalized searching table.
  • the results set from the four queries include the same four columns: Company Name, City, State and DUNS Number from the business data (e.g., D&B) normalized searching table.
  • a Company Selection dialog may be used to display the results of the Find Company Query.
  • the dialog is a small popup modal dialog that uses the client's standard style sheet color scheme.
  • the main frame of the dialog has a dialog title plus a short description of the dialog contents and use. Additional elements in the dialog include a Company Name List scrollable list box, an Ok button, and a Cancel button.
  • the Company Name List may be a standard list box with selectable column headers for the search results columns.
  • FIG. 131 illustrates a table 13100 of columns for a Company Name List in accordance with certain implementations of the invention.
  • the resulting Company Name List is sorted by default based on Company Name from lowest to highest alphabetically. Clicking on any column header, except the Company Selection Radio Button, re-sorts the list by that column in ascending order. Clicking on the column header subsequent times toggles the sort order between ascending and descending.
  • FIG. 132 illustrates a company location search results dialog 13200 in accordance with certain implementations of the invention.
  • the Find Company Locations Query is achieved using a hidden DUNS Number column from the Company Name row in the dialog.
  • the main business data (e.g., D&B) table is searched using the DUNS Number column and location records found are returned and populated in the company location Search Results dialog.
  • the Cancel Button closes the dialog, discards the search results and returns the user's context to the location list screen
  • the Company location Search Results dialog is used to display the results of the Find Company Locations Query.
  • the dialog may be a pop-up modal dialog that uses the client's standard style sheet color scheme.
  • the main frame of the dialog has a dialog title. Additional elements in the dialog include a location Results List scrollable list box, a Select All button, a Clear All button, an Ok button, and a Cancel button.
  • the location Results List is a standard list box with selectable column headers for the search results columns.
  • FIG. 133 illustrates a table 13300 of columns for a location Results List in accordance with certain implementations of the invention.
  • the location Results List is assembled from a view between the business data (e.g., D&B) normalized searching table and the main business data (e.g., D&B) table.
  • the resulting Company Name List is sorted by default based on Company Name from lowest to highest alphabetically. Clicking on any column header, except the location Number and Inclusion Check Box, re-sorts the list by that column in ascending order. Clicking on the column header subsequent times toggles the sort order between ascending and descending.
  • the Select All Button sets the location Inclusion Check Box in all list rows to Checked state.
  • the Clear All Button sets the location Inclusion Check Box in all list rows to Unchecked state.
  • the Ok Button closes the dialog and then causes the rows indicated by the location Inclusion Check Box to be processed and then placed into the location list screen.
  • the selected items that fall below the minimum geocode level are moved directly to the rating Results Frame of the location list screen.
  • Those that fall at or above the minimum geocode level are sent to the Landmark Rating Query and then moved to the rating Results Frame of the location list screen with the landmark rating columns added.
  • the Cancel Button closes the dialog, discards the search results, and returns the user's context to the location list screen.
  • the Company Entry field is a text data entry field that is, for example, 120 physical characters, 30 displayable characters and horizontally cursor scrollable.
  • the Company Entry may have a minimum of 3 characters and may not contain a percent character ‘%’.
  • the default is empty.
  • the Street 1 Entry field is a text data entry field that is, for example, 64 physical characters, 40 displayable characters and horizontally cursor scrollable.
  • the Street 1 Entry may have a minimum of 3 characters and may not contain a percent character ‘%’. The default is empty.
  • the Street 2 Entry field is a text data entry field that is, for example, 64 physical characters, 40 displayable characters and horizontally cursor scrollable.
  • the Street 2 Entry is optional and may have a minimum of 3 characters and may not contain a percent character ‘%’.
  • the default is empty.
  • the City Entry field is a text data entry field that is, for example, 50 physical characters, 30 displayable characters, and horizontally cursor scrollable.
  • the City Entry may have a minimum of 3 characters and may not contain a percent character ‘%’. The default is empty.
  • the State Dropdown may be populated with the standard 50 US states plus one blank entry to allow the user to select a state to include as search criteria in the Find Company query.
  • the default is empty.
  • the ZIP Entry field is a text data entry field that is, for example, 16 characters.
  • the ZIP Entry may have a minimum of 5 characters and may not contain a percent character ‘%’.
  • the ZIP+4 extension is optional and may be separated by a fixed hyphen character ‘-’ as part of the entry field. The default is empty.
  • the Find Address Button initiates the enterprise spatial system geocode process on-the-fly using the Web services geocoding service and passing it the user entered address fields in, for example, an XML request format.
  • the geocoded address if successfully geocoded and above the minimum geocode level, is then automatically sent to the Landmark Rating Query and the final results passed to the rating Results Frame of the location list screen. If the address does not geocode to minimum geocode level the user is prompted with the geocoding process Results dialog.
  • FIG. 134 illustrates a geocoding process Results dialog 13400 that is used to display the results of the geocoding process in accordance with certain implementations of the invention.
  • the dialog may be a small pop-up modal dialog that uses the client's standard style sheet color scheme.
  • the main frame of the dialog may have a dialog title plus a short description of the Geocode Results Status. Additional elements in the dialog include an Ok button and a Cancel button.
  • the Geocode Results Status field shows the geocode result status associated with the address geocode attempt. This status includes the short form result code, result description, and any hint available regarding changes that may be made to the address to correct the problem.
  • a text description above the Ok and Cancel Buttons may read: Add to location list anyway.
  • the Ok Button closes the dialog and passes the user entered address fields to the rating Results Frame of the location list screen without the landmark rating columns populated.
  • the Cancel Button closes the dialog, discards the geocoded address results, and returns the user's context to the location list screen without adding a record to the rating Results Frame.
  • the Landmark Rating Query is achieved using a spatial intersection ‘within distance’ query between the geocoded location attribute of the location record and the landmark rating view.
  • the result of the Landmark Rating Query is to add a single rating column to the location record made up of the Pml_rating_num and Pml_rating_group_cd columns from the query results set.
  • the ‘within distance’ query finds landmarks within, for example, 1 mile of the geocoded location of the location record.
  • a 1 mile distance is the size of the 6th ring dimension on the ‘total loss’ event type.
  • the name/value pair table is called qt_other_items.
  • the Pml_rating num is a number from, for example, 1 to 10.
  • the Pml_rating_group—cd is a code that has the possible results, for example, ‘High’, ‘Medium’ and ‘Low’.
  • the resulting column test may be hyphenated together to form a string (e.g., ‘1-Low’). This column merging is done in the landmark rating view and returns one column because the landmark rating column is used in the reporting application service.
  • the Landmark Rating Query orders the query results by highest pml_rating_num and returns the first row (the highest rating number). Queries on location records with minimum geocode levels where no Landmark Rating Query row results may be returned receive a default value of ‘ 0 -None’. Rating columns for location records without minimum geocode levels or no geocode may be left blank.
  • the minimum geocode level are those records with a geocode status of ‘AS0’.
  • FIG. 135 illustrates a screen 13500 displaying location records in accordance with certain implementations of the invention.
  • FIG. 136 illustrates a table 13600 describing a data source for the location list columns in accordance with certain implementations of the invention.
  • the resulting location list is sorted by default based on rating number from highest to lowest numerically. Clicking on any column header, except the location number and Inclusion Check Box, re-sorts the list by that column in ascending order. Clicking on the column header subsequent times toggles the sort order between ascending and descending. As locations are added to the list from either the business data (e.g., D&B) search or Manual Address entry, the list is resorted with those records included using the sort order last chosen by the user.
  • the location Count Display indicates the number of records show in the location list.
  • the Select All Button sets the location Inclusion Check Box in all list rows to Checked state.
  • the Clear All Button sets the location Inclusion Check Box in all list rows to Unchecked state.
  • the Export Selected Records Button allows the user to save the location list to, for example, a CSV text output file on a local disk drive.
  • FIG. 137 illustrates a table 13700 listing columns of data that may be exported in accordance with certain implementations of the invention. Those location records with the location Inclusion Check Box are exported from the location list into the CSV file.
  • the CSV file contains each column of data, bound in double quotation and separated by a comma. Each location record is delimited from other records by a carriage return and line feed character added to the end of the record as an end of record marker.
  • FIG. 138 illustrates a sample CSV file 13800 in accordance with certain implementations of the invention.
  • a new Search Button clears the location rating Results Frame from the screen and clears the resets the Option 1 and 2 date entry fields to their default state.
  • the client's logo may be clicked upon to return to the portal Main menu and will log off the user from the system. If the user does not click the Log Off logo, the user may still count as one used license until the session cleanup process clears their session or the user attempts to re-login. During re-login, if a session is shown to exist, the user may be prompted to close the other session. No two sessions may be allowed at any one time.
  • FIG. 139 illustrates a reporting application service screen flow 13900 in accordance with certain implementations of the invention.
  • Flow 13900 shows the overall reporting site map starting from the high level landmark report links that through aggregate drill-down to the policy location Detail screen that underlies the landmark reports. Data displayed as part of the selected reports is filtered based on the users rights as assigned by their role.
  • the total book of business by landmark report shows policy location PML data aggregated by periodic batch load columns in 4 different views; 1 main report and 3 dimensional sub-report: by Ring, by Division and by Coverage.
  • the report views allow row/column cell selection to display a policy location detail report that supports the cell's aggregate value.
  • FIG. 140 illustrates a total book of business by landmark report 14000 in accordance with certain implementations of the invention.
  • the report includes, for example: Level 1 Tab 1—landmark List; Level 1 Tab 2—landmark List with Ring Sub-List; Level 1 Tab 3—landmark List with Coverage Sub-List; Level 1 Tab 4—landmark List with Division Sub-List; and Level 2—policy Detail List.
  • FIG. 141 illustrates a new business by landmark report 14100 in accordance with certain implementations of the invention.
  • the report includes, for example: Level 1 Tab 1—landmark List; Level 1 Tab 2—landmark List with Ring Sub-List; Level 1 Tab 3—landmark List with Coverage Sub-List; Level 1 Tab 4—landmark List with Division Sub-List; and Level 2—policy Detail List.
  • FIG. 142 illustrates a new business by landmark report 14200 in accordance with certain implementations of the invention.
  • the report includes, for example: Level 1 Tab 1—landmark List; Level 1 Tab 2—landmark List with Ring Sub-List; Level 1 Tab 3—landmark List with Coverage Sub-List; Level 1 Tab 4—landmark List with Division Sub-List; and Level 2—policy Detail List.
  • a report may include, for example: Level 1—Ring List; Level 2 Tab 1—Single Ring business Unit List; Level 2 Tab 1—Single Ring Coverage List; and Level 3—policy Detail List.
  • the user may see a total for the detail report that is lower than the aggregate. This is due to policy detail that was included in the aggregate but that the user has no right to see at the detail level. Those policy detail entries may be omitted from the report.
  • FIG. 143 illustrates a table 14300 of columns for a policy detail in accordance with certain implementations of the invention.
  • Data may be provided, for example, in either an Excel spreadsheet in separate columns or in a CSV file with columns separated by commas and delimited by double quotation marks. Additional columns including role and other information may be added, but are not required for batch loading. The additional columns may be useful for managing the loading phases for users.
  • FIG. 144 illustrates an admin application service custom screen flow 14400 in accordance with certain implementations of the invention.
  • FIG. 145 illustrates a screen 14500 for setting up landmarks in accordance with certain implementations of the invention. For landmark set up, location, PML CAP and adjustments, and division caps may be entered.
  • FIGS. 146 and 147 illustrate a screen 14600 for setting up events in accordance with certain implementations of the invention. For event set up, ring details, damage rates per coverage type, and a PML rating table may be configured.
  • FIG. 148 illustrates an admin application service business table screen flow 14800 in accordance with certain implementations of the invention.
  • line of business As for business tables, line of business, coverage types, deductible types, aggregate types, limit adjustment types, division, department business unit, workers comp, and other setup items may be stored.
  • FIG. 149 illustrates an admin application service ESS delegated screen flow 14900 in accordance with certain implementations of the invention.
  • FIG. 150 illustrates a table 15000 for policy data access rights in accordance with certain implementations of the invention.
  • a data services group makes sure that a strategy and process is developed to acquire and deploy data components required by the customer.
  • Data services members work with Project Management members and the ETL and Data store development teams to define the processes and then develop and implement the schedules required to meet the customer commitments.
  • Reference data is included as part of the standard base data layers and includes, for example, roads data and city, state and ZIP data for the 50 U.S. states.
  • the Roads data is used as the basis for the geocoding process used on the business (e.g., D&B) data, client data, and any ad hoc address search by functions in the applications.
  • a controlled validation process is used to confirm system impact of updated releases of Roads data along with the geocoding process.
  • Additional reference data layers may include the city, state, ZIP code and waterbodies boundary layers.
  • the underwriter application service accesses business data (e.g., D&B data).
  • the business data (e.g., D&B data) locations selected are then combined with manually entered location addresses that were geocoded on the fly by the underwriter application service. These resulting locations are then spatially compared against the landmark location layer and rated.
  • FIG. 151 illustrates a primary table 15100 in accordance with certain implementations of the invention. The duplicate rows are removed from the table above to make it a distinct extraction of the main business data (e.g., D&B data) table.
  • main business data e.g., D&B data
  • the business name table is searched first and any combination of State, City and business_Name may be provided as keys. Also, a partial business_Name may be provided that is a right-hand wildcard name. This right-hand wildcard returns records where the business_Name begins with that partial string.
  • the business name results set including DUNS, State, City and business_Name columns, are returned to the user for selection of correct business name.
  • the DUNS number is used to select all business location records from the main business data (e.g., D&B data) table where the DUNS number matches. These business location records are then returned to the user with a subset of columns.
  • the main business data (e.g., D&B) table may be converted into a spatial layer for spatial intersection querying of the landmark spatial layer in the client data store by the underwriter application.
  • the requirements for data deployment include the following: loading of fixed width ASCII source file into a data store table; creating normalized, derivative searching table with DUNS number, business name, City and State; creating of required foreign key relationships and searching indexes on the both business data (e.g., D&B) tables; creating a spatial layer for the main data store table; geocoding of main data store table; analyzing and adjustment of storage model; and preparation of transportable table space for production deployment. Since the business data (e.g., D&B data) may be provide on a quarterly basis, an automated ETL process for the business data (e.g., D&B) updates may be provided.
  • D&B data may be provide on a quarterly basis
  • an automated ETL process for the business data (e.g., D&B) updates may be provided.
  • the following items may be validated on the production business data (e.g., D&B) data store: the total number of records from the original dataset are hosted; the total number of distinct business names from the original dataset are hosted in the business name table; the relationship between the business name table and the main business data (e.g., D&B) table are correct; cleansed addresses and geocode statuses are not null; the performance of the business name search on the business table is less than a predetermined time (e.g., 1 second); the performance of the DUNS location search on the main business data (e.g., D&B) table is less than a predetermined time (e.g., 1 second); and user accounts may execute required queries.
  • a predetermined time e.g. 1 second
  • a predetermined time e.g., 1 second
  • user accounts may execute required queries.
  • the business data (e.g., D&B) data store may be provisioned on a quarterly basis and validation procedures required may be developed into an automated sequence that may be repeated as each update is received. Each update may be a dataset replacement.
  • the business data includes policy location and high-risk landmark lists both configured with spatial layer indexing and dimensional analysis. Additionally the data contains associated lookup and associative entities to support business dimensional analysis of both the policy location and landmark data.
  • the risk manager, underwriter, reporting and admin application services may each access the client business data in a different way: the risk manager service uses spatial query access to both policy location and landmark layers; the underwriter service uses business data (e.g., D&B) location data to query against the landmark layer; the reporting service uses landmark Layer data to drill-down to policy location layer data; and the admin service manages the supporting business tables used for PML calculations and drill-down between the landmark layer and policy location layer.
  • business data e.g., D&B
  • the data store may be integrated into each application service through a custom implementation.
  • all but the risk manager application services are new sites fully independent from the main application leveraging the portal to navigate between them, and, in the case of the risk manager ring analysis functionality, custom screens and dataflow have been specifically designed to integrate the custom schema.
  • the data store is made up of three main source datasets: landmark data, policy location data, and setup data.
  • landmark data is provisioned using the Package Manager as two spatial layers.
  • Real policy data provided by the client may be provisioned using the automated ETL process.
  • the setup data may be provided as factory setup data with the initial data store setup by the data store team.
  • Setup data changes may be managed by the client in the production system directly using the admin application service.
  • the enterprise spatial system performs geocoding and spatial layer creation as part of the pre-production setup and deployment. Landmark data changes may be managed by the client in the production system directly using the risk manager application service ad hoc landmark ring analysis functionality.
  • the policy location data is business data that may be provided from the client on a periodic basis and deployed into the production system using the secure, automated ETL process. Each batch of data loaded may be, for example, approximately 2 million records.
  • the policy location data is provided to enterprise spatial system by the client on a periodic basis in, for example, a data store dump format in read-format.
  • the policy location data is provisioned into production using an automated ETL process.
  • Each periodic load is assigned a unique batch number with which all setup data for that period's (e.g., month's) load is associated.
  • the data store setup includes creation of production data from a data model, stored procedures, and setup data provided by the client.
  • the data store schema along with ETL procedures to normalize and generate PML values, may be designed and provided by the client.
  • the schema and ETL procedures may be run by the enterprise spatial system in conjunction with the geocoding and deployment process of getting the data into the production system.
  • the data store schema may be provided to enterprise spatial system in, for example, an ErWin model format by the client.
  • the ErWin schema model and the associated production Data Definition Language (DDL) scripts are stored in PVCS at the at enterprise spatial system.
  • PVCS is a software package available from a Merant, Inc. that may be used to store and maintain different versions of software and data. There are other such software packages available in the market from other companies that may also be used instead of or in addition to PVCS.
  • the data store schema DDL are included in the enterprise spatial system production deployment process. Once launched, updates are deployed using schema modification DDL. Schema changes are controlled through enterprise spatial system's normal Quality Assurance (QA) validation and operational deployment process.
  • QA Quality Assurance
  • FIG. 152 illustrates a table 15200 of views of the client data store in accordance with certain implementations of the invention.
  • the meta data setup includes: layer setup, user friendly name setup, and point n′ view setup.
  • both the landmark and policy location data are provisioned as logical layers.
  • the landmark layer a single logical layer may be provided for user access.
  • the policy location layer is viewed as multiple logical layers, each shown as a different month and separated by the unique batch number in data selections on that single physical layer.
  • FIG. 153 illustrates a table 15300 of physical and logical layers in accordance with certain implementations of the invention.
  • the underwriter role allows the user to see policy location data that is owned by a division that the user is a member of.
  • the user division is stored in the user profile and applied at data layer query time to limit the record set to policy locations where the parent policy table contains an organization key that is part of that user's division.
  • the remaining two system roles, Corporate and Management, are limited in their access to policy location data based on the user account that they have access to and their Views granted on the policy location data granted to that account.
  • the data dictionary contains user-friendly name information on data store tables.
  • the landmark layer includes available data elements in the landmark table as point n′ view elements.
  • the policy location layer includes a subset of elements from a combination of both the policy and policy location layers.
  • the policy location data set is the central business data to be provided by the client for use in the enterprise spatial system.
  • the policy location data is critical to their business and highly confidential. As such, key aspects of the handling of this data are the security and accuracy of the data as it moves from the client's environment through the enterprise spatial system's processes and into the production system.
  • the data is provisioned to the production system by an automated ETL process. Additionally, testing and validation may be done using a manufactured test dataset to avoid unnecessary internal access and exposure of real customer data.
  • the ETL process may include components built by both the client and enterprise spatial system.
  • FIG. 154 illustrates a ETL process 15400 in accordance with certain implementations of the invention.
  • the enterprise spatial system ETL process may sequence the execution of these components based on the workflow defined in FIG. 154 .
  • the data is extracted, loaded, cleansed, geocoded, and spatially provisioned for non-spatial batch reporting.
  • the loaded data becomes the current, active dataset used by the enterprise spatial system services.
  • Data integration services 140 also referred to as Extraction Transformation, and Loading (ETL) get corporate data into the enterprise spatial system. This includes all forms of data including that which may be non-spatial in nature (e.g. revenue, number of purchases, mother's maiden name, etc.).
  • FIG. 155 illustrates a data integration services flow 15500 in accordance with certain implementations of the invention.
  • corporate data may be submitted to the data center in a secure manner.
  • the data center performs, for example, validation, address cleansing, geocoding, transformation of data based on a Dun & Bradstreet data lookup, raster processing, and/or business rule application, before storing the data.
  • a data administrator may submit a large batch of data to the data center for validation, geocoding, and storage.
  • the data integration services 140 track the user or process that is uploading data, open a log for a pre-validation and post-validation script for entering results, and output data to a file.
  • the data integration services 140 upload data to a temporary table (e.g., storing Binary Large Objects (BLOBs)) and then write referring records into an event/queue table that is monitored. Writing records into the event/queue table may also start up the validation/import process.
  • a pre-validation script may be used for client specific, non-validation code that may change by data source/source (e.g., code to unZIP a file coming from a zipped source/application).
  • the pre-validation script may also be used to update an inventory system or work order system for use by an enterprise spatial system team.
  • a post-validation script may be used to start specific customer processes (e.g., a Dun & Bradstreet data lookup).
  • the post-validation script may also be used to update an inventory system or work order system for use by an enterprise spatial system team.
  • the data integration services 140 provide historical retention. Historical retention may be described as a mechanism for automatically date/time stamping records uploaded to provide a time based map (e.g., prospects as of now versus three months ago).
  • the data integration services 140 are connection agnostic, but security aware (e.g., accept secure posts (VPN or HTTPS).
  • processing may stop at first error, while in other implementations, processing of an entire record set may be completed before errors are returned.
  • certain implementations provide for a batch versus transaction flag in data source, with a minimum percentage of good records threshold (e.g., a pass %) set for each process.
  • the data integration services 140 cascade failures so that the user receives an error message that makes sense.
  • data is accepted from an old data source version, which may be useful for programmatic integrations but may result in less than accurate data.
  • the data may be accepted via use of the pre-validation script.
  • a business rules data store contains valid lookups and required fields for each data source/version combination.
  • the Web-form is automatically built from metadata, while in alternative implementations a URL of the Web-form may be submitted as input.
  • a Web-form generically refers to HTML code that, when rendered by a client application, such as a browser, is manifested as a form on the screen into which the user enters their input to the application.
  • the data integration services 140 process various formats of data (e.g., delimited, Structured Query Language (SQL), vendor specific (e.g., data from Oracle), etc.). Also, the data integration services 140 provide a mechanism for restoration to state prior to loading of data.
  • SQL Structured Query Language
  • vendor specific e.g., data from Oracle
  • the enterprise spatial system enables different roles to be assigned to users.
  • a system admin i.e., an enterprise spatial system admin
  • a customer admin role allows users assigned to this role to administer users, roles and longer term data sources for integration.
  • a data admin role allows users assigned to this role by a system admin or a customer admin to upload data into the enterprise spatial system.
  • a data entity role allows third party programs assigned to this role by a system admin or a customer admin to upload data into the enterprise spatial system.
  • a system admin may administer users (e.g., add, remove, edit, assign roles). For example, a system admin may assign one user to have a customer admin role and may assign another user to have a data admin role.
  • the system admin also administers data sources with version control.
  • a security level may be defined for the data sources (e.g., VPN, SSL, HTTPS, or None).
  • the data sources may have defined validation entry and exit functions, defined metadata, define geocode rules, define minimum geo-code level, defined business rules, defined “Transactional” or “Batch” indicator (which determines whether each record will be processed end-to-end before the next record is processed or if all records will pass through each level before proceeding to the next level), and defined output options.
  • the administrator entities e.g., system admin or data admin
  • a results log may provide information such as, location, size, overwrite/append, etc. for data,
  • the customer admin administer users (e.g., add, remove, edit, assign roles). For example, the customer admin may assign a user to have a data admin role.
  • the customer admin also administers data Sources with version control.
  • a security level may be defined for the data sources (e.g., VPN, SSL, HTTPS, or None).
  • the data sources may have defined validation entry and exit functions, defined metadata, define geocode rules, define minimum geo-code level, defined business rules, defined “Transactional” or “Batch” indicator (which determines whether each record will be processed end-to-end before the next record is processed or if all records will pass through each level before proceeding to the next level), and defined output options.
  • the administrator entities may be able to submit records (e.g., as users). Additionally, a results log may provide information such as, location, size, overwrite/append, etc. for data.
  • the data admin may handle batch integration.
  • the data admin logs in (in which case security and access level are verified).
  • the data admin may upload a file selected from pre-defined data sources or by specifying a location of file (if not uploaded).
  • the data admin performs a validation process on the file (e.g., to make sure the file conforms to the data source.
  • a response e.g., fails validation, records processed, records not processed—reason, etc.
  • the data admin may resubmit fixes or cancel the process (e.g., roll-back any changes).
  • the data admin may also geocode data, store records, and output failed records to a file (e.g., comma separated values (CSV), delimited, spreadsheet, etc.). Results may be logged at each block.
  • CSV comma separated values
  • the data admin may perform transactional integration.
  • the data admin logs in (in which case security and access level are verified).
  • the data admin may select data sources and submit a record (i.e., select a data source where the data the record can be found).
  • the data admin performs a validation process on the file (e.g., to make sure the file conforms to the data source.
  • a response e.g., fails validation, records processed, records not processed—reason, etc.
  • the data admin may resubmit fixes or cancel the process (e.g., roll-back any changes).
  • the data admin may also geocode data, store records, and output failed records to a file (e.g., comma separated values (CSV), delimited, spreadsheet, etc.). Results may be logged at each block.
  • CSV comma separated values
  • a data entity may perform batch integration.
  • the data entity connects to a Web Service provided by the enterprise spatial system, calls the appropriate method to upload a file by passing parameters to indicate a data source, location, etc.
  • the data entity performs a validation process on the file (e.g., to make sure the file conforms to the data source.
  • An XML response e.g., fails validation, records processed, records not processed—reason, etc.
  • the data entity may also geocode data, store records, and output failed records to a file (e.g., comma separated values (CSV), delimited, spreadsheet, etc.). Results may be logged at each block.
  • CSV comma separated values
  • a data entity may perform transactional integration.
  • the data entity connects to a Web Service provided by the enterprise spatial system, calls the appropriate method to upload a file by passing parameters to indicate a data source, location, etc.
  • the data entity performs a validation process on the file (e.g., to make sure the file conforms to the data source.
  • An XML response e.g., fails validation, records processed, records not processed—reason, etc.
  • the data entity may also geocode data, store records, and output failed records to a file (e.g., comma separated values (CSV), delimited, spreadsheet, etc.). Results may be logged at each block.
  • CSV comma separated values
  • FIGS. 156A and 156B illustrate administration scenarios 1 and 2 with screens 15600 and 15610 , respectively, in accordance with certain implementations of the invention.
  • scenario 1 in addition to integration of existing and new customers, the user with the system admin role sets up a new data source to allow for integration of prospects into the enterprise spatial system solution.
  • scenario 1 the user logs into an admin application. The user selects the company in question and a “New Data Source” from the list of data sources under company information. The user specifies a unique name of the data source (e.g., “Prospect Upload”). Upon adding a data source, the version is set to 1 automatically and is read-only. The user defines metadata for the data source (e.g., columns and column types).
  • the user may optionally select a security protocol.
  • the user defines the validation entry and exit function (e.g. a Dun & Bradstreet data lookup).
  • the user defines geocode rules (e.g., geocoding engine, business rules, etc.).
  • the user optionally selects data admins/entities who will be able to work with the data source.
  • the user optionally specifies details of a results log (e.g., location, size, overwrite/append, etc.).
  • the user with the system admin role modifies the “Prospect Upload” data.
  • the user logs into an admin application.
  • the user selects the company in question and a “prospect Upload” from the list of data sources under company information.
  • the version is automatically incremented to 1 and is read-only.
  • the user optionally modifies metadata for the data source (e.g., adding and/or removing columns and column types).
  • the user may optionally modify a security protocol.
  • the user may optionally modify the validation entry and exit function (e.g. a Dun & Bradstreet data lookup).
  • the user may optionally modify geocode rules (e.g., geocoding engine, business rules, etc.).
  • the user optionally selects data admins/entities who will be able to work with the data source.
  • the user optionally specifies details of a results log (e.g., location, size, overwrite/append, etc.).
  • FIGS. 157A, 157B and 157 C illustrate data integration services scenario 3 with screens 15700 , 15710 , and 15720 , respectively, in accordance with certain implementations of the invention.
  • a user with a data admin role performs manual daily upload of prospect data from a lead generation program (e.g., manual or batch).
  • the user with the data admin role may be a power-user level individual.
  • the user logs into an enterprise spatial system application. Authentication of the user is performed to determine that the user has data admin privileges, and a UI changes the “Preferences” Menu to “Tools”. Then, the user is able to select “Upload Data” from the “Tools” menu to upload the prospect data.
  • the user selects the “Prospect Upload” data source from the data integration service list of available data sources (e.g., which may already be filtered to show those for which the user has privileges), and, if there is only one data source, there is automatic selection of that data source.
  • the user may select the “browse” button to locate the file for upload then selects “Continue” to begin Validation. If the file fails the Validation (e.g., the file is the “customers” file and not the “prospects” upload file), the user will get a message indicating the nature of the failure. If the file passes the Validation checks, the file is then handed off to the Validation exit function for further possible processing (e.g., a Dun & Bradstreet data lookup).
  • the geocoding process takes place.
  • the user is presented with the records that did not meet the minimum geocoding minimum-level defined.
  • the user can export failed records (e.g., CSV, delimited, spreadsheet, etc), elect to proceed with records that do meet the criteria or cancel and resubmit the whole batch once the records are completed.
  • “Proceed” is selected, then the records are added to the enterprise spatial system data store.
  • the user may optionally view details of the results log (e.g., which indicates batch completed or aborted, number of records succeeded, number of records failed) and take appropriate action.
  • a third party system with a data entity role performs a daily upload of prospect data from a lead generation program (e.g., manual or batch).
  • the third party system includes a third party program that connects to the DIS Web services provided by the enterprise spatial system and is authenticated as a data entity.
  • the third party program passes a data file containing prospect data to the Web service for pre-processing with parameters (e.g., data source/version information, number of records, actions to take upon failure code, etc.). If the file fails the Validation (e.g., the file is the customer upload file and not the prospects upload file), the Web service returns a code indicating the nature of the failure.
  • the enterprise spatial system attempts to perform that action. If the file passes the Validation checks, the file is then handed off to the Validation exit function for further possible processing (e.g., a Dun & Bradstreet data lookup). If that function is completed without error, then the geocoding process takes place. The enterprise spatial system determines whether the percentage (%) of good records threshold has been reached. If so, then the “good” records are added to the enterprise spatial system data store, with the failed record information being posted back to the initiating program. If not, then the entire transaction is canceled, with the failed results being posted back to the initiating program. Then, the user may optionally view the details of the results log (e.g., which indicates batch completed or aborted, number of records succeeded, number of records failed) and take appropriate action.
  • the results log e.g., which indicates batch completed or aborted, number of records succeeded, number of records failed
  • a user with a data admin role performs manual periodic entry of customer data from an accounting application (e.g., manual/transactional).
  • the user logs into the admin application.
  • the user's authentication shows that the user has data admin privileges, and the UI changes the “Preferences” Menu to “Tools”.
  • the user selects “Upload Data” from the “Tools” menu to enter the prospect data.
  • the user selects the “Customer Import” data source from the data integration service list of available data sources (which may already be filtered to show those data sources for which the user has privileges), and, if there is only one data source, there is automatic selection of that data source.
  • the user enters the customer data in the appropriate Web form and selects “Submit” to begin Validation. If the data fails the Validation (e.g., the data fails some required field business rule), the user will get a messaging indicating the nature of the failure. If the data passes the Validation checks, the data is then handed off to the Validation exit function for further possible processing (e.g., Dun & Bradstreet data lookup). If that function is completed without errors, then the geocoding process takes place. If geocoding fails for some reason, the user can elect to correct the form so that the data will meet the criteria or may cancel processing.
  • the data fails the Validation (e.g., the data fails some required field business rule)
  • the user will get a messaging indicating the nature of the failure.
  • the data passes the Validation checks, the data is then handed off to the Validation exit function for further possible processing (e.g., Dun & Bradstreet data lookup). If that function is completed without errors, then the geocoding process takes place. If geocoding fails for some reason, the user can
  • FIGS. 158A, 158B , and 158 C illustrate another data integration services scenario with screens 15800 , 15810 , and 15820 , respectively, in accordance with certain implementations of the invention.
  • a user performs data entry in some other program which then puts the data into the enterprise spatial system data store for mapping (e.g., automated/transactional).
  • the user logs into a lead management application and adds a prospect to the lead tracking data store.
  • the “Save Record” function is modified to call a Web service, passing the details of the record, the data source name/version number, user information and password, and possibly other parameters. If the data fails the Validation (e.g., the data is the customer upload file and not the prospects upload file), the Web service returns a code indicating the nature of the failure. If the code matches the failure code of a specific action above, the enterprise spatial system attempts to perform that action.
  • the data passes the Validation checks, the data is then handed of to the Validation exit function for further possible processing (e.g., Dun & Bradstreet data lookup). If that function is completed without errors, then the geocoding process takes place.
  • the enterprise spatial system determines whether a record meets a minimum geocoding level. If so, then the record is added to the enterprise spatial system data store. If not, the enterprise spatial system passes a failure message back to the initiating system so the user can be presented with the form containing data that did not meet the geocoding minimum-level defined. The user may correct the data so that the data meets the criteria or may cancel the process in the other application.
  • the user optionally views details of a results log (e.g., which indicates batch completed or aborted, number of records succeeded, number of records failed) and take appropriate action.
  • various administration screens are provided by the enterprise spatial system. After selecting a company, the user is presented with the “Customer Details” screen that includes a section called Data Integrations. Selecting “Data Integrations” expands the selection to show the available paths (e.g., hyperlinks). These paths take a user to add new integrations or to edit/view the specific integration selected.
  • FIG. 159 illustrates screen 15900 with a list of existing known data sources for a given customer in accordance with certain implementations of the invention.
  • the screen for Editing/Viewing an existing Integration may be the same as the screen for adding a new integration, except the fields may already be populated when the screen is presented.
  • FIG. 160 illustrates a screen 16000 with an example of a possible treatment for how to add a new data source in accordance with certain implementations of the invention.
  • adding a data source may entail pointing to a saved instance of a Data Junction connection.
  • FIG. 161 illustrates a preference menu 16100 in accordance with certain implementations of the invention. Selecting the “Upload Data” selection may take the user to a screen illustrated in FIG. 162 , depending on the data sources the user has access to.
  • FIG. 162 illustrates a screen 16200 with a list of data sources available to a give data admin in accordance with certain implementations of the invention.
  • FIG. 163 illustrates an example of a screen 16300 used for a batch type data source in accordance with certain implementations of the invention.
  • FIG. 164 illustrates an example of a screen 16400 used for a transaction type data source.
  • the screen in FIG. 164 may be replaced by a UI in a client application.
  • Appropriate error messages are displayed if the user inputs invalid file or data information.
  • Example error messages include: Location or file name invalid—file not found; Required fields ⁇ list of fields> not completed. Please complete and try again; Data fails validation process. Please correct and resubmit: ⁇ reason returned from validation process>; Data fails percentage threshold for minimum GeoCoding level. Please correct and try again. ⁇ reason returned from GeoCoding process>; Data fails business rule checks. Please correct and resubmit: ⁇ reason returned from business rule checking process>.
  • a spatial editor 138 is provided as part of an enterprise spatial system.
  • the spatial editor 138 includes one or more custom user interfaces (UIs) that allows the spatial system to handoff control to an customer specific application that performs customer specific validations and computations based on the editing performed in the spatial system.
  • the custom UI includes a drop down menu with data driven entries, which may be labeled “Advanced Edit” from an Edit Mode screen.
  • the spatial editor 138 enables graphical editing, graphical shape validation, and execution of business logic associated with the graphical changes.
  • the spatial editor 138 may perform graphical editing, while graphical shape validation and execution of business logic may be performed at a client computer connected to the enterprise spatial system.
  • the graphical editing features provide a broad-based generic editing feature set.
  • a client handoff is performed to handoff, for example, a graphical element, to a client so that the client may perform graphical shape validation, business logic validation, and spatial updating.
  • the client verifies that the spatial update has been committed to the enterprise spatial system before committing changes to a client data store.
  • rollbacks on the Enterprise spatial system are supported over a Web Services interface.
  • All editing and object manipulations may be performed on new or existing data layers (including a blank data layer).
  • the enterprise spatial system limits the commands available and the data layers that may be modified or viewed based on user rights.
  • the role of the user is available to the client (e.g., after the client handoff), and any additional rights management related to specific business rules may then be performed at the client.
  • Editing commands may involve passing parameters to the client that have the basic format of selected items and a command. It is up to the client to validate the command and parameters, execute business logic, perform the requested spatial command, request that shape files are updated, and update any specific business tables. Thus graphical manipulation is performed with the spatial editor 138 , while backend processing is performed with the client.
  • the save may not be canceled.
  • the UI waits for a response or a timeout A timeout will cause a flush of all temporary information and any loaded features followed by a refresh.
  • the refresh is generated from spatial features in a data store in the server.
  • the first return scenario is normal completion of the command, which updates the spatial data on at the enterprise spatial system through Web services and then causes a refresh on the client.
  • the refresh causes the updated shapes to appear on the client.
  • the other return is typically due to error conditions or a requested cancel by the user. In this case, no spatial update is performed and no refresh occurs.
  • the state of the client editor is just the same as when the handoff occurred.
  • the client may first perform business specific logic before the prompt and vary the prompt based upon customer needs.
  • the graphical editing extensions include object interaction and multi-object editing.
  • a first selected object has priority among two objects that are selected.
  • Object interaction includes overlapping polygons and split objects.
  • Overlapping polygons cover 1) absorbing overlap (e.g., first selected object takes overlapping area), 2) merging (e.g., first object merges in second object and internal lines disappear), and 3) creating new object from overlap (e.g., a new polygon is created from overlap and boundaries are modified).
  • Split objects cover 1) intersection (e.g., first object is split at the intersection(s) with the second object and the second objects shape between the intersections) and 2) selected point(s) (e.g., closest point on object is selected and object is split there, with one point for lines and two points selected for polygons).
  • Multi-objects are sets of the same object type, either all lines or all polygons, which are logically associated with each other.
  • the objects in the multi-object are highlighted.
  • Auto merging may be performed at the client. After a multi-polygon is selected, then join or un-join is selected and a particular polygon is selected to be joined to the multi-polygon or split off from it
  • a move object to back command is allows selection of interior polygons in complex polygon. In certain implementations, even though the interior polygon may be visible, the selection tool may be unable to select the internal polygon if the exterior polygon was first loaded into the layer.
  • FIG. 165 illustrates a screen 16500 with advanced edit menus 16510 in accordance with certain implementations of the invention.
  • the additional editing features may be available under the “Advanced Editing” drop down menu from the Edit Mode screen.
  • the following menu items support the editing extensions: Group 1: Split by Drawn Line and Split by Selection; Group 2: Create by Intersect, Absorb, and Merge; Group 3: Join Objects, Un-join Objects, and Move to Back; Group 4: Sampling Grid and Activity by Batch.
  • FIG. 166 illustrates a table 16600 of editing extension points in accordance with certain implementations of the invention.
  • the table 16600 illustrates operations, indicates whether special handling is needed, indicates whether there is a client handoff, indicates whether there is a handoff at save, indicates whether there is a client prompt, and lists attribute entries. The operations listed are available under the normal plus extended client editing functions.
  • a client handoff assumes that there is a client handoff after the client side has completed the graphical portion of the operation, and this handoff substitutes for the normal return to the enterprise spatial system platform.
  • a handoff at save involves operations that do not cause a client handoff by themselves but that make changes to the shape. This may result in a Save operation to be requested, and, at the time of the Save operation, a client handoff occurs, instead of command processing by the enterprise spatial system.
  • some operations may work better by skipping the client prompt and going directly to the client handoff so that some business logic on the client side may be checked before the prompting. This would allow the client side to prevent certain actions from being able to be started based upon specific needs. Additionally, some operations would normally trigger an Attribute Entry screen at the client.
  • the client supports extended attributes in addition to the core attributes on the standard Attribute Entry screens. By skipping the Attribute Entry, clients have full control to do a combined attribute interface.
  • a client specific help file supports the client application.
  • This help file is built and maintained by the enterprise spatial system using a base help file and adding sections needed to support advanced editing, a contact screen, and a banner screen as provided by a customer.
  • FIG. 167 illustrates how overlapping polygons 16700 may be modified in different ways in accordance with certain implementations of the invention.
  • one object may absorb the overlap, two objects may merge into one object or two objects may create a new polygon from the overlap.
  • a first polygon is selected, the first polygon outline may be highlighted, and a color change is possible.
  • an operation is selected.
  • the second polygon is selected, the second polygon outline may be highlighted, and a color change is possible.
  • there is a handoff to a client system where business logic may be applied, spatial manipulation may be performed, and any additional prompting (e.g., attribute entry) may be performed. From there, the processing returns from the client system, and the return causes either a refresh with updated objects or shows an error/status box with no refresh.
  • FIGS. 168A and 168B illustrate objects 16800 , 16810 split by selection and/or intersection in accordance with certain implementations of the invention.
  • Objects e.g., lines or polygons
  • the client backend has a technique of determining which of the object splits, if any, overwrites the original object.
  • client side software does not determine whether objects actually intersect.
  • an object to split is selected. This object may be highlighted, and a color change is possible.
  • the Split by Selection tool is selected from the drop down menu.
  • the second object e.g., a line or polygon
  • the outline of the second object may be highlighted, and color change is possible.
  • FIG. 169 illustrates objects 16900 to be split by a drawn line in accordance with certain implementations of the invention.
  • Polygons or lines may be split by an intersection with a temporary drawn line.
  • the client backend has a technique of determining which portion of the split item, if any, overwrites the original one.
  • the temporary line is cleared automatically. Initially, an object to split is selected. The object is highlighted, and a color change is possible.
  • the Split by Drawn Line tool is selected from a drop down menu. Then, a first point of a temporary splitting line is placed on the object, and a second point of the temporary line is placed on the object A rubber banding line may be visible while the second point is being selected.
  • a signal e.g., a double click of an input device
  • a client system where business logic may be applied, spatial manipulation may be performed, and any additional prompting (e.g., attribute entry) may be performed.
  • the processing returns from the client system, and the return causes either a refresh with updated objects or shows an error/status box with no refresh.
  • the temporary line is automatically erased when a refresh occurs.
  • FIG. 170 illustrates multi-polygons 17000 in accordance with certain implementations of the invention.
  • (1) is a simple polygon; (2) is a multi-polygon that does not include touching or enclosing; (3) is a complex polygon with one polygon enclosing another but not sharing a line segment; and, (4) is a multi-complex polygon, which is represented as at least two objects.
  • the multi-polygons illustrated in FIG. 170 are from the open GIS standard.
  • the spatial editor 138 supports manipulation of these multi-objects.
  • Multi-objects are sets of the same object type, either all lines or all polygons, which are logically associated with each other. Multi-objects reside on a same data layer and may touch but do not cross. They are treated as one unit for certain operations, such as delete and move.
  • FIG. 171 illustrates examples of shapes 17100 that cannot be represented by a single multi-polygon in accordance with certain implementations of the invention.
  • (1) represents polygons that may touch at a point but that do not share a line segment; (2) represents polygons that are not closed (i.e., a multi-polygon can not include a line); and (3) represents polygons that overlap.
  • the spatial editor 138 UI does little or no relationship validations for multi and complex shapes in certain implementations.
  • the spatial editor 138 UI allows the selection and manipulation of shapes, and then the commands are passed to the client for validation and execution.
  • the client enforces that shape types, such as line or polygon, are matching.
  • Manipulations of multi-objects include selection of a multi-object, which highlights objects that are part of the multi-object with a special highlighting.
  • Deleting a multi-object is performed by executing delete with a highlighted multi-object.
  • a multi-object may have features that are off the extent of the screen. Even though the high-lighted object may indicate that it has multiple objects (e.g., with special highlighting), deleting a multi-object may erase something that is not visible on the screen. This situation may be checked by the client backend system, and the user may be instructed to expand the extent to include the full multi-object. Deletion of multi-objects may also be prevented and the user required to un-join and delete each object separately.
  • the join operation is selected, and then the object to add is selected. If this creates a multi-object, then selection was performed on a single object before choosing the join command.
  • Removing an object requires choosing the un-join command and then selecting one of the highlighted objects. In certain implementations, this does not have to erase the un-joined object, and the decision of whether to erase the un-joined object maybe determined on the client.
  • the un-joined object may need to have its attributes updated since un-joining is similar to creating a new object.
  • Editing may be performed to a single object in the multi-object at a time. All editing such as vertex editing must be performed on a single polygon of the multi-polygon. This allows vertex adding, deletion and moving of one polygon of a multi-polygon without a client handoff.
  • a move to back command places the selected object to the back most position in the current layer. This allows obscured polygons to move forward so that they may be selected for various actions.
  • portions of a multi-polygon may not be separately moved.
  • the multi-polygon moves as one unit. Changes in the relative position of one polygon to another is performed by first un-joining a particular polygon, moving the un-joined polygon, and then re-joining the polygon to the multi-polygon.
  • the Join operation may be used to create a multi-polygon, multi-line or a complex polygon.
  • the Join operation may also be used to add additional polygons to existing multi or complex polygons or to add additional lines to multi-lines.
  • an object single, multi or complex
  • a color change is possible with a special color for multi/complex object.
  • the Join tool is selected from a drop down menu.
  • the second object is selected, and the outline of the second object may be highlighted, with a color change possible for the second object.
  • the un-join operation may be used to remove a polygon from a multi-polygon or a complex polygon.
  • the un-join operation may also be used to remove a line from a multi-line. If the resulting object after the un-join is a single object, then the object is no longer considered a multi or complex object. Attributes may be prompted for the un-joined object, since its attributes were the same as the multi-object before the un-join. Initially, an object (single, multi or complex) is selected that will have an object unjoined from it. A color change is possible with a special color for multi/complex object.
  • the Un-join tool is selected from a drop down menu.
  • One of the highlighted objects in the multi-object is selected as a second object, and the outline of the second object may be highlighted, with a color change possible for the second object. Then, there is a handoff to a client system where business logic may be applied, spatial manipulation may be performed, and any additional prompting (e.g., attribute entry) may be performed. From there, the processing returns from the client system, and the return causes either a refresh with updated objects or shows an error/status box with no refresh.
  • Polygons in complex polygons may partially or completely obscure another polygon, making it difficult to select the underlying polygon.
  • multiple identical shapes may have different attributes and occupy the same location.
  • the “Move to Back” command is available. This allows selecting the top item and pushing it to the back of the logical ordering of viewed items. This makes the next underlying item accessible. In the case of several overlying items, this operation may be performed several times until the desired object is available for selection.
  • a thematic mapping menu includes three types of thematic mapping: shaded area, sized symbols, and shaded symbols.
  • FIG. 172 illustrates a screen 17200 for shaded area thematic mapping in accordance with certain implementations of the invention.
  • FIG. 173 illustrates a screen 17300 for sized symbols thematic mapping in accordance with certain implementations of the invention. Sized symbols expands thematic mapping to include point data.
  • the sized, graduated or proportional symbol is a type of thematic mapping that sizes a circle, or any other symbol, based on the numeric values of a particular field with a set of data that has a single point of reference. This may be used, for example, for point data, but the centroids of zip codes, census tracts, states, or the like may also be used.
  • FIG. 174 illustrates a screen 17400 for shaded symbols thematic mapping in accordance with certain implementations of the invention.
  • the shaded symbols show each unique data value as a different color. This is may be useful, for example, for non-numeric point data.
  • a data set of fast food restaurants is displayed by the restaurant type, such as the “name” field, where each name would be a different color or symbol.
  • the described techniques for real time insurance policy underwriting and risk management may be implemented as a method, apparatus or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof.
  • article of manufacture refers to code or logic implemented in hardware logic (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.) or a computer readable medium, such as magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc.), optical storage (CD-ROMs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, firmware, programmable logic, etc.).
  • Code in the computer readable medium is accessed and executed by a processor.
  • the code in which various implementations are implemented may further be accessible through a transmission media or from a file ESS server over a network.
  • the article of manufacture in which the code is implemented may comprise a transmission media, such as a network transmission line, wireless transmission media, signals propagating through space, radio waves, infrared signals, etc.
  • the “article of manufacture” may comprise the medium in which the code is embodied.
  • the “article of manufacture” may comprise a combination of hardware and software components in which the code is embodied, processed, and executed.
  • the article of manufacture may comprise any information bearing medium known in the art.
  • the logic described herein refers to specific operations occurring in a particular order. In alternative implementations, certain of the logic operations may be performed in a different order, modified or removed. Moreover, operations may be added to the above described logic and still conform to the described implementations. Further, operations described herein may occur sequentially or certain operations may be processed in parallel, or operations described as performed by a single process may be performed by distributed processes.
  • the logic described herein may be implemented in software, hardware, programmable and non-programmable gate array logic or in some combination of hardware, software, or gate array logic.
  • FIG. 175 illustrates an architecture of a computer system that may be used in accordance with certain implementations of the invention.
  • Computer 100 or 120 may implement computer architecture 17500 .
  • the computer architecture 17500 may implement a processor 17502 (e.g., a microprocessor), a memory 17504 (e.g., a volatile memory device), and storage 17510 (e.g., a non-volatile storage area, such as magnetic disk drives, optical disk drives, a tape drive, etc.).
  • An operating system 17505 may execute in memory 17504 .
  • the storage 17510 may comprise an internal storage device or an attached or network accessible storage.
  • Computer programs 17506 in storage 17510 may be loaded into the memory 17504 and executed by the processor 17502 in a manner known in the art.
  • the architecture further includes a network card 17508 to enable communication with a network.
  • An input device 17512 is used to provide user input to the processor 17502 , and may include a keyboard, mouse, pen-stylus, microphone, touch sensitive display screen, or any other activation or input mechanism known in the art.
  • An output device 17514 is capable of rendering information from the processor 17502 , or other component, such as a display monitor, printer, storage, etc.
  • the computer architecture 17500 of the computer systems may include fewer components than illustrated, additional components not illustrated herein, or some combination of the components illustrated and additional components.
  • the computer architecture 17500 may comprise any computing device known in the art, such as a mainframe, server, personal computer, workstation, laptop, handheld computer, telephony device, network appliance, virtualization device, storage controller, etc. Any processor 17502 and operating system 17505 known in the art may be used.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
US10/537,636 2002-12-16 2003-12-16 Real-time insurance policy underwriting and risk management Abandoned US20060100912A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/537,636 US20060100912A1 (en) 2002-12-16 2003-12-16 Real-time insurance policy underwriting and risk management

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US43359702P 2002-12-16 2002-12-16
US43799003P 2003-01-06 2003-01-06
US44960103P 2003-02-26 2003-02-26
US10/388,666 US7107285B2 (en) 2002-03-16 2003-03-14 Method, system, and program for an improved enterprise spatial system
US10/388666 2003-03-14
PCT/US2003/039972 WO2004059420A2 (fr) 2002-12-16 2003-12-16 Souscription d'une police d'assurance et gestion de risques en temps reel
US10/537,636 US20060100912A1 (en) 2002-12-16 2003-12-16 Real-time insurance policy underwriting and risk management

Publications (1)

Publication Number Publication Date
US20060100912A1 true US20060100912A1 (en) 2006-05-11

Family

ID=32686262

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/537,636 Abandoned US20060100912A1 (en) 2002-12-16 2003-12-16 Real-time insurance policy underwriting and risk management

Country Status (5)

Country Link
US (1) US20060100912A1 (fr)
EP (2) EP1573598A4 (fr)
AU (2) AU2003300950A1 (fr)
CA (2) CA2510108A1 (fr)
WO (2) WO2004059538A2 (fr)

Cited By (319)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040186753A1 (en) * 2003-03-21 2004-09-23 David Kim System and method for catastrophic risk assessment
US20040220837A1 (en) * 2003-04-30 2004-11-04 Ge Financial Assurance Holdings, Inc. System and process for a fusion classification for insurance underwriting suitable for use by an automated system
US20040249678A1 (en) * 2003-06-03 2004-12-09 Henderson E. Devere Systems and methods for qualifying expected risk due to contingent destructive human activities
US20050012396A1 (en) * 2003-07-18 2005-01-20 Avinash Chidambaram Graphical interface for configuring a power supply controller
US20050108083A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US20050108080A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US20050149498A1 (en) * 2003-12-31 2005-07-07 Stephen Lawrence Methods and systems for improving a search ranking using article information
US20050198565A1 (en) * 2004-02-20 2005-09-08 Mcchrystal Peter S. Method and apparatus for automatic update ad notification of documents and document components stored in a document repository
US20050240483A1 (en) * 2004-04-26 2005-10-27 Shinobu Ito Document managing system and method
US20050268299A1 (en) * 2004-05-11 2005-12-01 International Business Machines Corporation System, method and program for scheduling computer program jobs
US20060075344A1 (en) * 2004-09-30 2006-04-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Providing assistance
US20060080188A1 (en) * 2004-09-30 2006-04-13 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supply-chain side assistance
US20060076398A1 (en) * 2004-09-30 2006-04-13 Searete Llc Obtaining user assistance
US20060086781A1 (en) * 2004-10-27 2006-04-27 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Enhanced contextual user assistance
US20060090132A1 (en) * 2004-10-26 2006-04-27 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Enhanced user assistance
US20060116898A1 (en) * 2003-11-18 2006-06-01 Peterson Gary E Interactive risk management system and method with reputation risk management
US20060116979A1 (en) * 2004-12-01 2006-06-01 Jung Edward K Enhanced user assistance
US20060117001A1 (en) * 2004-12-01 2006-06-01 Jung Edward K Enhanced user assistance
US20060161526A1 (en) * 2005-01-18 2006-07-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obtaining user assistance
US20060157550A1 (en) * 2005-01-18 2006-07-20 Searete Llc Obtaining user assistance
US20060173816A1 (en) * 2004-09-30 2006-08-03 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Enhanced user assistance
US20060236408A1 (en) * 2005-04-14 2006-10-19 International Business Machines Corporation Method and apparatus for device dependent access control for device independent web content
US20060242024A1 (en) * 2004-09-02 2006-10-26 Welcomemat Services, Inc. Business method for promoting goods and services of providers
US20070038529A1 (en) * 2004-09-30 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supply-chain side assistance
US20070040013A1 (en) * 2004-09-30 2007-02-22 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obtaining user assistance
US20070124276A1 (en) * 2003-09-23 2007-05-31 Salesforce.Com, Inc. Method of improving a query to a database system
US20070146374A1 (en) * 2005-12-13 2007-06-28 Sorren Riise System and method for creating minimum bounding rectangles for use in a geo-coding system
US20070150199A1 (en) * 2005-12-13 2007-06-28 Soren Riise System and method for geo-coding using spatial geometry
US20070192347A1 (en) * 2006-02-15 2007-08-16 Allstate Insurance Company Retail Deployment Model
US20070204277A1 (en) * 2006-02-27 2007-08-30 Burgess Andrew L Jr Computer program and method for managing implementation of a process
US20070203759A1 (en) * 2006-02-27 2007-08-30 Guy Carpenter & Company Portfolio management system with gradient display features
US20070221743A1 (en) * 2006-03-23 2007-09-27 Weinzapfel Robert A Methods of calculating impact time for storms
US20070223841A1 (en) * 2006-03-23 2007-09-27 Weinzapfel Robert A Methods of characterizing the probability of wind impact
US20070244935A1 (en) * 2006-04-14 2007-10-18 Cherkasov Aleksey G Method, system, and computer-readable medium to provide version management of documents in a file management system
US20070275266A1 (en) * 2006-05-25 2007-11-29 Idemitsu Kosan Co., Ltd. Organic electroluminescence device
US20070283435A1 (en) * 2006-05-31 2007-12-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Receiving an indication of a security breach of a protected set of files
US20070282723A1 (en) * 2006-05-31 2007-12-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Monitoring a status of a database by placing a false identifier in the database
US20080022400A1 (en) * 2006-05-31 2008-01-24 Searete Llc, A Limited Liablity Corporation Of The State Of Delaware Indicating a security breach of a protected set of files
US20080055096A1 (en) * 2006-06-09 2008-03-06 Aylward James A Real-time modeling analysis of hazards data with large numbers of locations and with customized reporting and web-based delivery
US20080065329A1 (en) * 2005-04-14 2008-03-13 Baron Services, Inc. System and Method for Displaying Storm Tracks
US20080103837A1 (en) * 2006-10-25 2008-05-01 Microsoft Corporation Risk reduction for participants in an online advertising exchange
WO2008064334A2 (fr) * 2006-11-21 2008-05-29 American International Group, Inc. Procédé et système de détermination de tarification d'assurance
US20080144130A1 (en) * 2006-12-13 2008-06-19 Kerigan Thomas M Document output processing
US20080154675A1 (en) * 2006-12-19 2008-06-26 Celeritasworks, Llc Campaign awareness management systems and methods
US7426438B1 (en) * 2007-03-16 2008-09-16 Westerngeco L.L.C. Technique to provide seismic data-based products
US20080229198A1 (en) * 2004-09-30 2008-09-18 Searete Llc, A Limited Liability Corporaiton Of The State Of Delaware Electronically providing user assistance
US20080235288A1 (en) * 2007-03-23 2008-09-25 Ben Harush Yossi Data quality enrichment integration and evaluation system
US20080235062A1 (en) * 2006-12-29 2008-09-25 American International Group, Inc. Method and system for initially projecting an insurance company's net loss from a major loss event
US20080281848A1 (en) * 2005-04-08 2008-11-13 John Corbett Method to share and exchange geographic based information
US20080300924A1 (en) * 2007-06-01 2008-12-04 American International Group, Inc. Method and system for projecting catastrophe exposure
US20080313224A1 (en) * 2007-06-12 2008-12-18 Griffith Frank P System and Method for Integration of Data Records Having Differing Data Types to a Geographical Information System
US20090089254A1 (en) * 2002-03-16 2009-04-02 Von Kaenel Tim A Method, system, and program for an improved enterprise spatial system
US20090106053A1 (en) * 2007-10-17 2009-04-23 Mervin Walker System and method for processing payroll related insurance premiums
US20090119133A1 (en) * 2005-07-07 2009-05-07 Yeransian Luke W Method and system for policy underwriting and risk management over a network
US20090198523A1 (en) * 2005-08-24 2009-08-06 Swiss Reinsurance Company Computer system and method for determining an insurance rate
WO2009140592A1 (fr) * 2008-05-15 2009-11-19 American International Group, Inc. Procédé et système pour s'assurer contre les risques opérationnels
WO2009146184A2 (fr) * 2008-04-15 2009-12-03 Metropolitan Life Insurance Co. Procede et systeme permettant d’evaluer un risque d’assurance
US20090313364A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Direct domain software and file access computer system
US20090313363A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Hosting a remote computer in a hosting data center
US20090313321A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Branded and comarketed domain-based thin client system
US20090313320A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Branded and comarketed domain-based thick client system
WO2009155618A2 (fr) * 2008-06-19 2009-12-23 Trustco Group International (Pty) Ltd Système de facilitation de transactions
US20100010837A1 (en) * 2008-07-09 2010-01-14 Hartford Fire Insurance Company System and method for use in billing for group benefit insurance
US20100029299A1 (en) * 2005-12-13 2010-02-04 Yahoo! Inc. System for geographically contextualizing data items
US20100030646A1 (en) * 2005-12-13 2010-02-04 Yahoo! Inc. System for providing location predictive advertising
US20100036677A1 (en) * 2008-08-07 2010-02-11 Humana Inc. Computerized settlement and invoice validation system for healthcare services
WO2010019497A1 (fr) * 2008-08-12 2010-02-18 Victor Bodansky Système et procédé de développement de produits d'assurance
US20100049553A1 (en) * 2008-08-25 2010-02-25 Jens Ortgiese On-Demand Flight Accident Insurance
US20100063851A1 (en) * 2008-09-10 2010-03-11 David Andrist Systems and methods for rating and pricing insurance policies
US20100070864A1 (en) * 2004-02-19 2010-03-18 Allen Mark G System for generating and displaying community awareness management data
US20100082178A1 (en) * 2008-09-29 2010-04-01 International Business Machines Corporation System and method to dynamically change data center partitions
US7698159B2 (en) 2004-02-13 2010-04-13 Genworth Financial Inc. Systems and methods for performing data collection
US20100094666A1 (en) * 2007-10-17 2010-04-15 Hartford Fire Insurance Company System and method for processing and transmitting payroll-related data for insurance transactions
US7712078B1 (en) * 2005-02-02 2010-05-04 Teradata Us, Inc. Techniques for data store population
US20100162383A1 (en) * 2008-12-19 2010-06-24 Watchguard Technologies, Inc. Cluster Architecture for Network Security Processing
US7769608B1 (en) * 2004-05-27 2010-08-03 Allstate Insurance Company Systems and methods for optimizing property risk ratings
US7774306B1 (en) * 2006-10-27 2010-08-10 Bnsf Railway Company Electronic file creation and management systems and methods
US20100205015A1 (en) * 2004-02-20 2010-08-12 Accenture Global Services Gmbh Account level participation for underwriting components
US20100211619A1 (en) * 2003-09-23 2010-08-19 Salesforce.Com, Inc. Distributive storage techniques for multi-tenant databases
US20100223284A1 (en) * 2005-09-09 2010-09-02 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US20100223162A1 (en) * 2004-09-30 2010-09-02 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supply-chain side assistance
US7801748B2 (en) 2003-04-30 2010-09-21 Genworth Financial, Inc. System and process for detecting outliers for insurance underwriting suitable for use by an automated system
US7813945B2 (en) 2003-04-30 2010-10-12 Genworth Financial, Inc. System and process for multivariate adaptive regression splines classification for insurance underwriting suitable for use by an automated system
US7818186B2 (en) 2001-12-31 2010-10-19 Genworth Financial, Inc. System for determining a confidence factor for insurance underwriting suitable for use by an automated system
US20100278446A1 (en) * 2009-04-30 2010-11-04 Oracle International Corporation Structure of hierarchical compressed data structure for tabular data
US20100281079A1 (en) * 2009-04-30 2010-11-04 Oracle International Corporation Compression analyzer
US20100281004A1 (en) * 2009-04-30 2010-11-04 Oracle International Corporation Storing compression units in relational tables
US7844476B2 (en) 2001-12-31 2010-11-30 Genworth Financial, Inc. Process for case-based insurance underwriting suitable for use by an automated system
US7844477B2 (en) 2001-12-31 2010-11-30 Genworth Financial, Inc. Process for rule-based insurance underwriting suitable for use by an automated system
WO2010138932A1 (fr) * 2009-05-29 2010-12-02 Paul Bradshaw Protection variable de la vie sur la base d'entrées dynamiques
US7890509B1 (en) 2006-12-05 2011-02-15 First American Real Estate Solutions Llc Parcel data acquisition and processing
US7895062B2 (en) 2001-12-31 2011-02-22 Genworth Financial, Inc. System for optimization of insurance underwriting suitable for use by an automated system
US7899688B2 (en) 2001-12-31 2011-03-01 Genworth Financial, Inc. Process for optimization of insurance underwriting suitable for use by an automated system
US7917292B1 (en) 2006-10-17 2011-03-29 Jpmorgan Chase Bank, N.A. Systems and methods for flood risk assessment
US20110078213A1 (en) * 2009-09-29 2011-03-31 Salesforce.Com, Inc. Techniques for managing functionality changes of an on-demand database system
US20110106783A1 (en) * 2009-11-03 2011-05-05 Kalbhavi Srinivas Mobile search with a landmark
US20110106569A1 (en) * 2009-11-04 2011-05-05 Michael Price System and method for automated risk management appraisal
US20110126138A1 (en) * 2009-11-20 2011-05-26 Sony Computer Entertainment Inc. Aiding Device in Creation of Content Involving Image Display According to Scenario and Aiding Method Therein
US20110150470A1 (en) * 2009-12-17 2011-06-23 Tellabs Operations, Inc. Procedure, apparatus, system, and computer program for network planning
US20110153560A1 (en) * 2009-12-18 2011-06-23 Victor Bryant Apparatus, method and article to manage electronic or digital documents in networked environment
US20110153368A1 (en) * 2009-12-17 2011-06-23 XtremeGIS, Inc. User Interactive Reinsurance Risk Analysis Application
US20110161375A1 (en) * 2009-12-24 2011-06-30 Doug Tedder Systems, methods and articles for template based generation of markup documents to access back office systems
US20110161119A1 (en) * 2009-12-24 2011-06-30 The Travelers Companies, Inc. Risk assessment and control, insurance premium determinations, and other applications using busyness
US7991638B1 (en) * 2006-06-21 2011-08-02 Sprint Communications Company L.P. Process for trade area generation
US8005693B2 (en) 2001-12-31 2011-08-23 Genworth Financial, Inc. Process for determining a confidence factor for insurance underwriting suitable for use by an automated system
US20110213811A1 (en) * 2006-07-31 2011-09-01 Insight Catastrophe Solutions Apparatuses, Methods and Systems for Providing a Risk Evaluation Product Builder User Interface
US8027868B1 (en) 2006-06-21 2011-09-27 Sprint Communications Company L.P. Trade area analyzer
US20110234482A1 (en) * 2010-03-26 2011-09-29 Salesforce.Com, Inc. Techniques for interpreting signals from computer input devices
US8041648B2 (en) 2006-02-15 2011-10-18 Allstate Insurance Company Retail location services
US8077927B1 (en) 2006-11-17 2011-12-13 Corelogic Real Estate Solutions, Llc Updating a database with determined change identifiers
US20120066005A1 (en) * 2010-09-10 2012-03-15 State Farm Mutual Automobile Insurance Company Systems and methods for grid-based insurance rating
US20120072464A1 (en) * 2010-09-16 2012-03-22 Ronen Cohen Systems and methods for master data management using record and field based rules
US8209755B2 (en) 2006-05-31 2012-06-26 The Invention Science Fund I, Llc Signaling a security breach of a protected set of files
US8219535B1 (en) 2006-02-15 2012-07-10 Allstate Insurance Company Retail deployment model
US20120185657A1 (en) * 2004-11-05 2012-07-19 Parag Gokhale Systems and methods for recovering electronic information from a storage medium
US8239421B1 (en) * 2010-08-30 2012-08-07 Oracle International Corporation Techniques for compression and processing optimizations by using data transformations
US20120233209A1 (en) * 2011-03-09 2012-09-13 Microsoft Corporation Enterprise search over private and public data
US20120246695A1 (en) * 2009-05-08 2012-09-27 Alexander Cameron Access control of distributed computing resources system and method
US8296321B2 (en) 2009-02-11 2012-10-23 Salesforce.Com, Inc. Techniques for changing perceivable stimuli associated with a user interface for an on-demand database service
WO2012158298A2 (fr) * 2011-05-18 2012-11-22 Rga Reinsurance Company Transformation de données pour prendre une décision d'assurabilité
US20120308967A1 (en) * 2011-06-01 2012-12-06 Shea Armand Broussard Method for Displaying Wildfires and History
US20120311416A1 (en) * 2011-06-03 2012-12-06 Hannes Richter Integrated hazard mapping system
US20120324387A1 (en) * 2011-06-15 2012-12-20 Nancy Anne Rausch Computer-Implemented Systems And Methods For Extract, Transform, And Load User Interface Processing
US20120330959A1 (en) * 2011-06-27 2012-12-27 Raytheon Company Method and Apparatus for Assessing a Person's Security Risk
US20130013344A1 (en) * 2011-07-08 2013-01-10 Ernstberger Kelly A Systems and methods for determining optional insurance coverages
US20130013346A1 (en) * 2011-07-09 2013-01-10 The Travelers Indemnity Company Systems and methods for product configuration
US20130024215A1 (en) * 2010-07-22 2013-01-24 Webcetera, L.P. Insurance quoting application for handheld device
US8370178B1 (en) * 2007-10-15 2013-02-05 United Services Automobile Association (Usaa) Systems and methods for marketing and/or servicing personal property insurance
US20130046559A1 (en) * 2011-08-19 2013-02-21 Hartford Fire Insurance Company System and method for computing and scoring the complexity of a vehicle trip using geo-spatial information
US20130070645A1 (en) * 2011-09-19 2013-03-21 Fujitsu Network Communications, Inc. Address table flushing in distributed switching systems
US8423389B2 (en) 2008-08-25 2013-04-16 Flightsurance Gmbh Flight accident insurance
US8438049B2 (en) 2011-08-02 2013-05-07 Hartford Fire Insurance Company System and method for processing data related to group benefit insurance having critical illness coverage
US8443366B1 (en) 2009-12-11 2013-05-14 Salesforce.Com, Inc. Techniques for establishing a parallel processing framework for a multi-tenant on-demand database system
WO2013085500A1 (fr) * 2011-12-07 2013-06-13 Data Insurance Holdings Ltd. Système et procédé de gestion d'assurance pour données électroniques
US8473518B1 (en) 2008-07-03 2013-06-25 Salesforce.Com, Inc. Techniques for processing group membership data in a multi-tenant database system
US20130179394A1 (en) * 2010-09-10 2013-07-11 Alkiviadis Simitsis System and Method for Interpreting and Generating Integration Flows
US8533818B1 (en) * 2006-06-30 2013-09-10 Symantec Corporation Profiling backup activity
US8542884B1 (en) 2006-11-17 2013-09-24 Corelogic Solutions, Llc Systems and methods for flood area change detection
US20130262171A1 (en) * 2010-12-10 2013-10-03 Solodko Properties, Llc System and Method for Directing and Monitoring the Activities of Remote Agents
US20130262153A1 (en) * 2012-03-28 2013-10-03 The Travelers Indemnity Company Systems and methods for certified location data collection, management, and utilization
US20130283141A1 (en) * 2012-04-20 2013-10-24 Latitude Geographics Group Ltd. Client Agnostic Spatial Workflow Form Definition and Rendering
US20130282407A1 (en) * 2012-04-19 2013-10-24 Eric William Snyder Apparatus, method and article to automate and manage communications in a networked environment
CN103383688A (zh) * 2012-05-02 2013-11-06 Sap股份公司 用于地理编码/地理处理的内存空间数据库
US8595181B2 (en) 2010-05-03 2013-11-26 Salesforce.Com, Inc. Report preview caching techniques in a multi-tenant database
US8595103B1 (en) * 2008-09-30 2013-11-26 Accenture Global Services Limited Deployment and release component system
US20130339053A1 (en) * 2012-04-11 2013-12-19 Children's National Medical Center Regional analysis of electronic health record data using geographic information systems and statistical data mining
US8626739B2 (en) 2004-03-31 2014-01-07 Google Inc. Methods and systems for processing media files
US8627006B2 (en) 2009-08-19 2014-01-07 Oracle International Corporation Storing row-major data with an affinity for columns
US8631076B1 (en) 2004-03-31 2014-01-14 Google Inc. Methods and systems for associating instant messenger events
US20140018951A1 (en) * 2012-07-05 2014-01-16 Flextronics Ap, Llc Method and system for determining and managing supply chain risk
US8635140B2 (en) 2006-07-31 2014-01-21 Insight Catastrophe Group, Llc Apparatuses, methods, and systems for providing a reconfigurable insurance quote generator user interface
US8645332B1 (en) 2012-08-20 2014-02-04 Sap Ag Systems and methods for capturing data refinement actions based on visualized search of information
US8649567B1 (en) 2006-11-17 2014-02-11 Corelogic Solutions, Llc Displaying a flood change map with change designators
US8655595B1 (en) 2006-10-17 2014-02-18 Corelogic Solutions, Llc Systems and methods for quantifying flood risk
US8682699B2 (en) 2010-12-26 2014-03-25 The Travelers Indemnity Company Systems and methods for customer-related risk zones
WO2014055057A1 (fr) * 2012-10-04 2014-04-10 Nesgos Peter D Système et procédé de gestion de risque d'investissement dans des compagnies d'opérateurs de satellites
US8704675B2 (en) 2004-09-30 2014-04-22 The Invention Science Fund I, Llc Obtaining user assistance
US8712805B1 (en) 2010-03-31 2014-04-29 United Services Automobile Association (Usaa) Method and system for providing geohazard information to customers
US8719119B1 (en) 2008-09-30 2014-05-06 Accenture Global Services Limited Post deployment query system
US8731973B2 (en) 2011-04-19 2014-05-20 Vertafore, Inc. Overlaying images in automated insurance policy form generation
US20140143312A1 (en) * 2012-11-16 2014-05-22 Planet Social, LLC Server for selecting a sequential task-oriented event and methods for use therewith
US20140156591A1 (en) * 2012-12-03 2014-06-05 Ut-Battelle, Llc Knowledge catalysts
US8749381B1 (en) * 2009-06-26 2014-06-10 United Services Automobile Association (Usaa) Systems and methods for automated house damage detection and reporting
US8762839B2 (en) 2004-09-30 2014-06-24 The Invention Science Fund I, Llc Supply-chain side assistance
US8775960B1 (en) * 2008-03-10 2014-07-08 United Services Automobile Association (Usaa) Systems and methods for geographic mapping and review
US8776067B1 (en) 2009-12-11 2014-07-08 Salesforce.Com, Inc. Techniques for utilizing computational resources in a multi-tenant on-demand database system
US8788295B1 (en) 2008-09-30 2014-07-22 Accenture Global Services Limited Reusable product system
US8793146B2 (en) 2001-12-31 2014-07-29 Genworth Holdings, Inc. System for rule-based insurance underwriting suitable for use by an automated system
US8812515B1 (en) * 2004-03-31 2014-08-19 Google Inc. Processing contact information
US8819632B2 (en) 2010-07-09 2014-08-26 Salesforce.Com, Inc. Techniques for distributing information in a computer network related to a software anomaly
US20140245165A1 (en) * 2013-02-28 2014-08-28 Donan Engineering Co., Inc. Systems and methods for collecting and representing attributes related to damage in a geographic area
US20140245210A1 (en) * 2013-02-28 2014-08-28 Donan Engineering Co., Inc. Systems and Methods for Collecting and Representing Attributes Related to Damage in a Geographic Area
US20140257862A1 (en) * 2011-11-29 2014-09-11 Wildfire Defense Systems, Inc. Mobile application for risk management
US20140277605A1 (en) * 2013-03-15 2014-09-18 Fisher-Rosemount Systems, Inc. Mobile analysis of physical phenomena in a process plant
US20140304007A1 (en) * 2013-04-05 2014-10-09 The Travelers Indemnity Company Systems and methods for account-level flood risk assessment
US8886853B2 (en) 2006-09-22 2014-11-11 Commvault Systems, Inc. Systems and methods for uniquely identifying removable media by its manufacturing defects wherein defects includes bad memory or redundant cells or both
WO2014193839A1 (fr) * 2013-05-31 2014-12-04 Innodata Synodex, Llc Procédé pour générer un groupe sélectionné de polices d'assurance émises
US8924428B2 (en) 2001-11-23 2014-12-30 Commvault Systems, Inc. Systems and methods of media management, such as management of media to and from a media storage library
US20150007074A1 (en) * 2008-06-22 2015-01-01 Tableau Software, Inc. Selecting the Type of Visual Marks in Data Visualizations Based on User-Selected Visual Properties of the Marks
US20150006569A1 (en) * 2013-06-28 2015-01-01 James Warner Method and apparatus for preparing disaster alert notice report
US20150019262A1 (en) * 2013-07-11 2015-01-15 Corelogic Solutions, Llc Method and system for generating a flash flood risk score
US8954420B1 (en) 2003-12-31 2015-02-10 Google Inc. Methods and systems for improving a search ranking using article information
US8965873B2 (en) 2004-03-31 2015-02-24 Google Inc. Methods and systems for eliminating duplicate events
US8972431B2 (en) 2010-05-06 2015-03-03 Salesforce.Com, Inc. Synonym supported searches
US8977739B2 (en) 2010-05-03 2015-03-10 Salesforce.Com, Inc. Configurable frame work for testing and analysis of client-side web browser page performance
US8977675B2 (en) 2010-03-26 2015-03-10 Salesforce.Com, Inc. Methods and systems for providing time and date specific software user interfaces
US20150081619A1 (en) * 2013-09-19 2015-03-19 Platfora, Inc. Systems and Methods for Interest-Driven Business Intelligence Systems Including Geo-Spatial Data
US8996823B2 (en) 2007-08-30 2015-03-31 Commvault Systems, Inc. Parallel access virtual tape library and drives
US20150095269A1 (en) * 2010-07-20 2015-04-02 Sparkling Logic, Inc. Contextual Decision Logic Elicitation
US20150178850A1 (en) * 2013-12-24 2015-06-25 The Travelers Indemnity Company Insurance applications utilizing virtual engineering data
US9069799B2 (en) 2012-12-27 2015-06-30 Commvault Systems, Inc. Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system
US9069901B2 (en) 2010-08-19 2015-06-30 Salesforce.Com, Inc. Software and framework for reusable automated testing of computer software systems
US20150187011A1 (en) * 2013-12-27 2015-07-02 Syntel, Inc. Computerized system and method of evaluating insurance product underwriting and rating data
US9141669B2 (en) 2013-01-22 2015-09-22 Go Daddy Operating Company, LLC Configuring an origin server content delivery using a pulled data list
US9160809B2 (en) 2012-11-26 2015-10-13 Go Daddy Operating Company, LLC DNS overriding-based methods of accelerating content delivery
US9189553B2 (en) 2004-03-31 2015-11-17 Google Inc. Methods and systems for prioritizing a crawl
US9201917B2 (en) 2003-04-03 2015-12-01 Commvault Systems, Inc. Systems and methods for performing storage operations in a computer network
US20150371227A1 (en) * 2013-01-30 2015-12-24 Barclays Bank Plc Registering a Mobile User
US20160012543A1 (en) * 2014-07-11 2016-01-14 The Travelers Indemnity Company Systems, Methods, and Apparatus for Utilizing Revenue Information in Composite-Rated Premium Determination
US9244779B2 (en) 2010-09-30 2016-01-26 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
US9286331B2 (en) 2010-05-06 2016-03-15 Go Daddy Operating Company, LLC Verifying and balancing server resources via stored usage data
US9307577B2 (en) 2005-01-21 2016-04-05 The Invention Science Fund I, Llc User assistance
US20160112453A1 (en) * 2008-06-19 2016-04-21 Servicemesh, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US9361366B1 (en) 2008-06-03 2016-06-07 Salesforce.Com, Inc. Method and system for controlling access to a multi-tenant database system using a virtual portal
US9367435B2 (en) 2013-12-12 2016-06-14 Vertafore, Inc. Integration testing method and system for web services
US9378100B2 (en) 2013-05-17 2016-06-28 Go Daddy Operating Company, LLC Tools for storing, accessing and restoring website content via a website repository
US20160189173A1 (en) * 2014-12-30 2016-06-30 The Nielsen Company (Us), Llc Methods and apparatus to predict attitudes of consumers
US9384198B2 (en) 2010-12-10 2016-07-05 Vertafore, Inc. Agency management system and content management system integration
US9384208B2 (en) 2013-01-22 2016-07-05 Go Daddy Operating Company, LLC Configuring a cached website file removal using a pulled data list
WO2016123042A1 (fr) * 2015-01-26 2016-08-04 Dragonfly Data Factory Llc Plateforme d'usine de données et système d'exploitation
US9438493B2 (en) 2013-01-31 2016-09-06 Go Daddy Operating Company, LLC Monitoring network entities via a central monitoring system
US20160321744A1 (en) * 2015-03-31 2016-11-03 Venminder, Inc. Systems and methods for automated management of contracts between financial institutions and vendors, automated preparation of examination reports, and automated management of examination reports
US9489647B2 (en) 2008-06-19 2016-11-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US9489695B1 (en) * 2012-12-03 2016-11-08 Guidewire Software, Inc. Extensible infrastructure for managing workflow on a plurality of installed application components that interact with a central hosted component
US9501211B2 (en) 2014-04-17 2016-11-22 GoDaddy Operating Company, LLC User input processing for allocation of hosting server resources
US9507814B2 (en) 2013-12-10 2016-11-29 Vertafore, Inc. Bit level comparator systems and methods
US9529871B2 (en) 2012-03-30 2016-12-27 Commvault Systems, Inc. Information management of mobile device data
US9535934B1 (en) * 2015-11-17 2017-01-03 International Business Machines Corporation Schema lifecycle manager
US20170010926A1 (en) * 2015-07-06 2017-01-12 Microsoft Technology Licensing, Llc Extensibility of engines in computing systems
US9549065B1 (en) 2006-05-22 2017-01-17 Convergys Customer Management Delaware Llc System and method for automated customer service with contingent live interaction
US9600400B1 (en) 2015-10-29 2017-03-21 Vertafore, Inc. Performance testing of web application components using image differentiation
US9613102B2 (en) 2014-04-01 2017-04-04 Tableau Software, Inc. Systems and methods for ranking data visualizations
US20170124661A1 (en) * 2015-11-01 2017-05-04 Bolt Solutions Inc. Book exchange process
US9660933B2 (en) 2014-04-17 2017-05-23 Go Daddy Operating Company, LLC Allocating and accessing hosting server resources via continuous resource availability updates
US9658868B2 (en) 2008-06-19 2017-05-23 Csc Agility Platform, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US9672232B1 (en) 2004-03-31 2017-06-06 Google Inc. Systems and methods for selectively storing event data
US20170221002A1 (en) * 2016-02-02 2017-08-03 Successfactors, Inc. Modeling Utilizing Staging Entity
CN107026888A (zh) * 2015-10-05 2017-08-08 株式会社突飞软件 大容量数据传送装置及方法
US9747579B2 (en) 2004-09-30 2017-08-29 The Invention Science Fund I, Llc Enhanced user assistance
US9747556B2 (en) 2014-08-20 2017-08-29 Vertafore, Inc. Automated customized web portal template generation systems and methods
US9786010B2 (en) * 2014-04-23 2017-10-10 State Farm Mutual Automobile Insurance Company Homeowners insurance application process using geotagged photos
USD800153S1 (en) * 2016-01-22 2017-10-17 Google Inc. Portion of a display screen with a changeable graphical user interface component
USD800761S1 (en) * 2016-01-22 2017-10-24 Google Inc. Portion of a display screen with a changeable graphical user interface component
US9898549B1 (en) * 2007-05-08 2018-02-20 Progress Software Corporation Tenant-aware database for software as a service
US20180060969A1 (en) * 2016-08-24 2018-03-01 Allstate Insurance Company System And Network For Tiered Optimization
US9928144B2 (en) 2015-03-30 2018-03-27 Commvault Systems, Inc. Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage
US9990308B2 (en) 2015-08-31 2018-06-05 Oracle International Corporation Selective data compression for in-memory databases
US9990608B2 (en) 2012-05-01 2018-06-05 Innovation Specialists Virtual professionals community for conducting virtual consultations with suggested professionals
US20180253798A1 (en) * 2014-09-05 2018-09-06 Hartford Fire Insurance Company Segmentation Platform System
US10101913B2 (en) 2015-09-02 2018-10-16 Commvault Systems, Inc. Migrating data to disk without interrupting running backup operations
US10147141B1 (en) * 2015-06-22 2018-12-04 Insurance Technologies Corporation Systems and methods for intelligent configuration of a dynamic interface
US20180349324A1 (en) * 2017-06-06 2018-12-06 Apttus Corporation Real-time and computationally efficent prediction of values for a quote variable in a pricing application
US10162712B2 (en) 2003-04-03 2018-12-25 Commvault Systems, Inc. System and method for extended media retention
US10181160B1 (en) 2014-04-25 2019-01-15 State Farm Mutual Automobile Insurance Company Systems and methods for assigning damage caused by an insurance-related event
US20190043134A1 (en) * 2017-08-02 2019-02-07 Matthew R. White System and method of quoting aviation insurance from multiple insurance vendors
CN109446281A (zh) * 2018-09-05 2019-03-08 广州市城市规划勘测设计研究院 基于ArcGIS的在线智能制图系统构建方法、系统与制图方法
US20190087247A1 (en) * 2015-04-24 2019-03-21 Senslytics Corporation Methods and systems correlating hypotheses outcomes using relevance scoring for intuition based forewarning
US10241963B2 (en) * 2017-05-19 2019-03-26 The United States Of America, As Represented By The Secretary Of The Navy Hash-based synchronization of geospatial vector features
US10249158B1 (en) 2014-10-07 2019-04-02 State Farm Mutual Automobile Insurance Company Systems and methods for automatically responding to a fire
US10255638B2 (en) 2012-12-21 2019-04-09 The Travelers Indemnity Company Systems and methods for surface segment data
CN109615263A (zh) * 2018-12-25 2019-04-12 中国矿业大学(北京) 一种社会风险信息采集处理系统及方法
US10262373B2 (en) 2013-06-07 2019-04-16 State Farm Mutual Automobile Insurance Company Systems and methods for grid-based insurance rating
US10291715B1 (en) * 2004-01-27 2019-05-14 Amazon Technologies, Inc. Controlling access to services via usage models
US20190164094A1 (en) * 2017-11-27 2019-05-30 Promontory Financial Group Llc Risk rating analytics based on geographic regions
US10339474B2 (en) 2014-05-06 2019-07-02 Modern Geographia, Llc Real-time carpooling coordinating system and methods
US10339486B1 (en) 2013-09-04 2019-07-02 Allstate Insurance Company Agency business planning tool
US10380691B1 (en) * 2008-04-03 2019-08-13 United Services Automobile Association (Usaa) Location variable insurance
US10395328B2 (en) 2012-05-01 2019-08-27 Innovation Specialists Llc Virtual professionals community for conducting virtual consultations with suggested professionals
US10411975B2 (en) 2013-03-15 2019-09-10 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with multi-tier deployment policy
US10417588B1 (en) * 2013-12-06 2019-09-17 Guidewire Software, Inc. Processing insurance related address information
US10445799B2 (en) 2004-09-30 2019-10-15 Uber Technologies, Inc. Supply-chain side assistance
US10458801B2 (en) 2014-05-06 2019-10-29 Uber Technologies, Inc. Systems and methods for travel planning that calls for at least one transportation vehicle unit
US10468139B1 (en) 2005-12-28 2019-11-05 United Services Automobile Association Systems and methods of automating consideration of low body mass risk
CN110458715A (zh) * 2019-07-05 2019-11-15 中国平安财产保险股份有限公司 风险评分方法、装置及计算机可读存储介质
US10482035B1 (en) * 2016-06-07 2019-11-19 Jpmorgan Chase Bank, N.A. Standard address key system and method
US10482536B1 (en) 2014-07-09 2019-11-19 Allstate Insurance Company Prioritization of insurance requotations
US10489861B1 (en) 2013-12-23 2019-11-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US10497059B1 (en) 2015-07-04 2019-12-03 Enerknol, Inc. Method and system for providing real time access to relevant energy policy and regulatory data
US10515716B2 (en) * 2015-11-18 2019-12-24 Agatha Inc. Clinical research information cloud service system and clinical research information cloud service method
US10547678B2 (en) 2008-09-15 2020-01-28 Commvault Systems, Inc. Data transfer techniques within data storage devices, such as network attached storage performing data migration
US10621640B2 (en) 2016-10-03 2020-04-14 Apttus Corporation Augmented and virtual reality quote-to-cash system
US10650461B2 (en) * 2015-10-06 2020-05-12 Hartford Fire Insurance Company System for improved network data processing
US10657468B2 (en) 2014-05-06 2020-05-19 Uber Technologies, Inc. System and methods for verifying that one or more directives that direct transport of a second end user does not conflict with one or more obligations to transport a first end user
US10681199B2 (en) 2006-03-24 2020-06-09 Uber Technologies, Inc. Wireless device with an aggregate user interface for controlling other devices
US10687166B2 (en) 2004-09-30 2020-06-16 Uber Technologies, Inc. Obtaining user assistance
US10684753B2 (en) 2012-03-28 2020-06-16 The Travelers Indemnity Company Systems and methods for geospatial value subject analysis and management
US10706474B2 (en) 2016-04-25 2020-07-07 Hartford Fire Insurance Company Supplemental review process determination utilizing advanced analytics decision making model
US10713230B2 (en) 2004-04-02 2020-07-14 Salesforce.Com, Inc. Custom entities and fields in a multi-tenant database system
US10735890B1 (en) * 2017-07-31 2020-08-04 Snap Inc. System to track visitation metrics
US10742735B2 (en) 2017-12-12 2020-08-11 Commvault Systems, Inc. Enhanced network attached storage (NAS) services interfacing to cloud storage
US10769212B2 (en) * 2015-07-31 2020-09-08 Netapp Inc. Extensible and elastic data management services engine external to a storage domain
US10783575B1 (en) 2016-07-01 2020-09-22 Apttus Corporation System, method, and computer program for deploying a prepackaged analytic intelligence module for a quote-to-cash application while protecting the privacy of customer data
US10783526B2 (en) 2006-12-19 2020-09-22 Celeritasworks, Llc Campaign awareness management systems and methods
US10789219B1 (en) 2012-03-28 2020-09-29 Guidewire Software, Inc. Insurance policy processing using questions sets
US20200334598A1 (en) * 2019-04-17 2020-10-22 Danah L. Prignano Automated summary system computer server associated with a risk relationship attribute value review
US20200349648A1 (en) * 2018-05-21 2020-11-05 Great-West Life & Annuity Insurance Company Planning engine for a financial planning system
US20200401585A1 (en) * 2019-05-31 2020-12-24 Teradata Us, Inc. Spatial joins in multi-processing computing systems including massively parallel processing database systems
US10902522B1 (en) 2013-12-06 2021-01-26 Guidewire Software, Inc. Inter-frame communication
CN112329083A (zh) * 2020-11-06 2021-02-05 大唐环境产业集团股份有限公司 一种烟风道结构智能设计系统的智能建模和方法
WO2021091954A1 (fr) * 2019-11-04 2021-05-14 Neptune Flood Incorporated Sélection, évaluation, désagrégation et affectation de risque
US11037249B2 (en) 2018-10-25 2021-06-15 Hartford Fire Insurance Company Document creation system and method utilizing optional component documents
US11100434B2 (en) 2014-05-06 2021-08-24 Uber Technologies, Inc. Real-time carpooling coordinating system and methods
US11120003B2 (en) * 2010-03-31 2021-09-14 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure
US11127081B1 (en) * 2014-07-22 2021-09-21 Allstate Insurance Company Generation and presentation of media to users
US11138669B1 (en) 2014-07-09 2021-10-05 Allstate Insurance Company Prioritization of insurance requotations
US11176615B1 (en) 2014-07-22 2021-11-16 Allstate Insurance Company Generation of an insurance quote based on another insurance quote
US11188853B2 (en) * 2019-09-30 2021-11-30 The Travelers Indemnity Company Systems and methods for artificial intelligence (AI) damage triage and dynamic resource allocation, routing, and scheduling
US11209553B2 (en) 2016-05-24 2021-12-28 Flex Ltd. Systems and methods for active supply chain monitoring
WO2022015949A1 (fr) * 2020-07-16 2022-01-20 Allstate Insurance Company Profilage de système dynamique basé sur l'extraction de données
US11232508B2 (en) 2017-04-11 2022-01-25 Apttus Corporation Quote-to-cash intelligent software agent
US11301456B2 (en) * 2020-05-07 2022-04-12 Sap Se Processing consistency validations of conditional foreign-key relations
US20220138031A1 (en) * 2015-04-24 2022-05-05 Senslytics Corporation Auto-hypotheses iteration to converge into situation-specific scientific causation using intuition technology framework
US11348676B2 (en) * 2007-04-25 2022-05-31 Canon Kabushiki Kaisha Medical examination system control apparatus and control method therefor
US11403711B1 (en) 2013-12-23 2022-08-02 Massachusetts Mutual Life Insurance Company Method of evaluating heuristics outcome in the underwriting process
US11416291B1 (en) * 2021-07-08 2022-08-16 metacluster lt, UAB Database server management for proxy scraping jobs
US11423758B2 (en) 2018-04-09 2022-08-23 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11494058B1 (en) * 2020-09-03 2022-11-08 George Damian Interactive methods and systems for exploring ideology attributes on a virtual map
US11531690B1 (en) * 2019-10-11 2022-12-20 Nationwide Mutual Insurance Co. Geospatial visualization and query tool
US11550786B1 (en) 2020-02-04 2023-01-10 Apttus Corporation System, method, and computer program for converting a natural language query to a structured database update statement
US11593223B1 (en) 2021-09-02 2023-02-28 Commvault Systems, Inc. Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants
US11615080B1 (en) 2020-04-03 2023-03-28 Apttus Corporation System, method, and computer program for converting a natural language query to a nested database query
US11615089B1 (en) 2020-02-04 2023-03-28 Apttus Corporation System, method, and computer program for converting a natural language query to a structured database query
US11720956B2 (en) * 2018-05-21 2023-08-08 Empower Annuity Insurance Company Of America Integrated graphical user interface for separate service levels of a financial planning system
US11900469B2 (en) 2015-02-03 2024-02-13 State Farm Mutual Automobile Insurance Company Point-of-service tool for entering claim information
US11956251B2 (en) 2006-12-28 2024-04-09 Perftech, Inc. System, method and computer readable medium for determining users of an internet service
US12014387B1 (en) 2021-07-23 2024-06-18 Apttus Corporation System, method, and computer program for providing a pricing platform for performing different types of pricing calculations for different customers
US12067037B1 (en) 2022-02-28 2024-08-20 Apttus Corporation System, method, and computer program for performing natural language searches for documents in a database using alternate search suggestions
USD1043727S1 (en) 2021-09-20 2024-09-24 Empower Annuity Insurance Company Of America Display screen or portion thereof with graphical user interface
US12135720B2 (en) * 2019-12-18 2024-11-05 Teradata Us, Inc. Spatial joins in multi-processing computing systems including massively parallel processing database systems

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090089101A1 (en) * 2003-09-19 2009-04-02 Hashim Safaa H Techniques for underwriting insurance policies using web-centric insurance management system
US9659268B2 (en) 2008-02-12 2017-05-23 CertusVies Technologies, LLC Ticket approval system for and method of performing quality control in field service applications
US20090327024A1 (en) 2008-06-27 2009-12-31 Certusview Technologies, Llc Methods and apparatus for quality assessment of a field service operation
US9208458B2 (en) 2008-10-02 2015-12-08 Certusview Technologies, Llc Methods and apparatus for analyzing locate and marking operations with respect to facilities maps
US9473626B2 (en) 2008-06-27 2016-10-18 Certusview Technologies, Llc Apparatus and methods for evaluating a quality of a locate operation for underground utility
US9208464B2 (en) 2008-10-02 2015-12-08 Certusview Technologies, Llc Methods and apparatus for analyzing locate and marking operations with respect to historical information
US8612271B2 (en) 2008-10-02 2013-12-17 Certusview Technologies, Llc Methods and apparatus for analyzing locate and marking operations with respect to environmental landmarks
CA2897462A1 (fr) 2009-02-11 2010-05-04 Certusview Technologies, Llc Systeme de gestion et procedes et appareil associes pour fournir une evaluation automatique d'une operation de localisation
CA2692110C (fr) 2009-02-11 2015-10-27 Certusview Technologies, Llc Methodes, dispositif et systemes permettant de faciliter et/ou de verifier les operations de localisation et/ou de marquage
CA2885962A1 (fr) 2009-06-25 2010-09-01 Certusview Technologies, Llc Methodes et appareil d'evaluation des demandes de services de localisation
US20130226624A1 (en) 2012-02-24 2013-08-29 B3, Llc Systems and methods for comprehensive insurance loss management and loss minimization
US9710867B2 (en) 2015-03-20 2017-07-18 Tata Consultancy Services, Ltd. Computer implemented system and method for determining geospatial fire hazard rating of an entity

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5839113A (en) * 1996-10-30 1998-11-17 Okemos Agency, Inc. Method and apparatus for rating geographical areas using meteorological conditions
US5897619A (en) * 1994-11-07 1999-04-27 Agriperil Software Inc. Farm management system
US6186793B1 (en) * 1995-11-07 2001-02-13 Randall E. Brubaker Process to convert cost and location of a number of actual contingent events within a region into a three dimensional surface over a map that provides for every location within the region its own estimate of expected cost for future contingent events
US6301563B1 (en) * 1998-04-14 2001-10-09 The Chubb Corporation System and method for determining risk exposure based on adjacency analysis
US20030061303A1 (en) * 2001-09-27 2003-03-27 International Business Machines Corporation Method, system, and program for providing information on proximate events

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5809478A (en) * 1995-12-08 1998-09-15 Allstate Insurance Company Method for accessing and evaluating information for processing an application for insurance
US6163770A (en) * 1998-08-25 2000-12-19 Financial Growth Resources, Inc. Computer apparatus and method for generating documentation using a computed value for a claims cost affected by at least one concurrent, different insurance policy for the same insured
US7120598B2 (en) * 2002-09-18 2006-10-10 Demand Insights Llc Method for managing an investment portfolio

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5897619A (en) * 1994-11-07 1999-04-27 Agriperil Software Inc. Farm management system
US6186793B1 (en) * 1995-11-07 2001-02-13 Randall E. Brubaker Process to convert cost and location of a number of actual contingent events within a region into a three dimensional surface over a map that provides for every location within the region its own estimate of expected cost for future contingent events
US5839113A (en) * 1996-10-30 1998-11-17 Okemos Agency, Inc. Method and apparatus for rating geographical areas using meteorological conditions
US6301563B1 (en) * 1998-04-14 2001-10-09 The Chubb Corporation System and method for determining risk exposure based on adjacency analysis
US20030061303A1 (en) * 2001-09-27 2003-03-27 International Business Machines Corporation Method, system, and program for providing information on proximate events

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Maptitude: A GIS Solution for Insurance", Maptitude.com, Archived by Archive.org on or before August 4, 2003; Available at: https://web.archive.org/web/20030804040817/http://www.caliper.com/Maptitude/Insurance/default.htm *
Aiken, et al., "Microsoft® Computer Dictionary, 5th Edition", Microsoft Press; 2002 *
Arizona Representatives Pierce, Cooley, Anderson, Pearce, et al. "HB 2121" April 6, 2002 *
McGuinness, John S. "Is 'Probable Maximum Loss' (PML) a Useful Concept?" 1969; Proceedings of the Casualty Actuarial Society *

Cited By (608)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8924428B2 (en) 2001-11-23 2014-12-30 Commvault Systems, Inc. Systems and methods of media management, such as management of media to and from a media storage library
US7895062B2 (en) 2001-12-31 2011-02-22 Genworth Financial, Inc. System for optimization of insurance underwriting suitable for use by an automated system
US7818186B2 (en) 2001-12-31 2010-10-19 Genworth Financial, Inc. System for determining a confidence factor for insurance underwriting suitable for use by an automated system
US8005693B2 (en) 2001-12-31 2011-08-23 Genworth Financial, Inc. Process for determining a confidence factor for insurance underwriting suitable for use by an automated system
US8793146B2 (en) 2001-12-31 2014-07-29 Genworth Holdings, Inc. System for rule-based insurance underwriting suitable for use by an automated system
US7844476B2 (en) 2001-12-31 2010-11-30 Genworth Financial, Inc. Process for case-based insurance underwriting suitable for use by an automated system
US7844477B2 (en) 2001-12-31 2010-11-30 Genworth Financial, Inc. Process for rule-based insurance underwriting suitable for use by an automated system
US7899688B2 (en) 2001-12-31 2011-03-01 Genworth Financial, Inc. Process for optimization of insurance underwriting suitable for use by an automated system
US8983896B2 (en) 2002-03-16 2015-03-17 The Paradigm Alliance, Inc. Method, system, and program for an improved enterprise spatial system
US8838553B2 (en) 2002-03-16 2014-09-16 The Paradigm Alliance, Inc. Method, system, and program for an improved enterprise spatial system
US20100114941A1 (en) * 2002-03-16 2010-05-06 The Paradigm Alliance, Inc. Method, system, and program for an improved enterprise spatial system
US10073979B2 (en) 2002-03-16 2018-09-11 The Paradigm Alliance, Inc. Method, system, and program for an improved enterprise spatial system
US20110004830A1 (en) * 2002-03-16 2011-01-06 The Paradigm Alliance, Inc. Method, system, and program for an improved enterprise spatial system
US8838555B2 (en) 2002-03-16 2014-09-16 The Paradigm Alliance, Inc. Method, system, and program for an improved enterprise spatial system
US20090089254A1 (en) * 2002-03-16 2009-04-02 Von Kaenel Tim A Method, system, and program for an improved enterprise spatial system
US8918730B2 (en) 2002-03-16 2014-12-23 The Paradigm Alliance, Inc. Method, system, and program for an improved enterprise spatial system
US20040186753A1 (en) * 2003-03-21 2004-09-23 David Kim System and method for catastrophic risk assessment
US9940043B2 (en) 2003-04-03 2018-04-10 Commvault Systems, Inc. Systems and methods for performing storage operations in a computer network
US9251190B2 (en) 2003-04-03 2016-02-02 Commvault Systems, Inc. System and method for sharing media in a computer network
US9201917B2 (en) 2003-04-03 2015-12-01 Commvault Systems, Inc. Systems and methods for performing storage operations in a computer network
US10162712B2 (en) 2003-04-03 2018-12-25 Commvault Systems, Inc. System and method for extended media retention
US7813945B2 (en) 2003-04-30 2010-10-12 Genworth Financial, Inc. System and process for multivariate adaptive regression splines classification for insurance underwriting suitable for use by an automated system
US8214314B2 (en) 2003-04-30 2012-07-03 Genworth Financial, Inc. System and process for a fusion classification for insurance underwriting suitable for use by an automated system
US7801748B2 (en) 2003-04-30 2010-09-21 Genworth Financial, Inc. System and process for detecting outliers for insurance underwriting suitable for use by an automated system
US20040220837A1 (en) * 2003-04-30 2004-11-04 Ge Financial Assurance Holdings, Inc. System and process for a fusion classification for insurance underwriting suitable for use by an automated system
US20040249678A1 (en) * 2003-06-03 2004-12-09 Henderson E. Devere Systems and methods for qualifying expected risk due to contingent destructive human activities
US7721213B2 (en) 2003-07-18 2010-05-18 Power Integrations, Inc. Graphical interface for configuring a power supply controller
US20090037030A1 (en) * 2003-07-18 2009-02-05 Power Integrations, Inc. Graphical interface for configuring a power supply controller
US7458028B2 (en) * 2003-07-18 2008-11-25 Avinash Chidambaram Graphical interface for configuring a power supply controller
US20050012396A1 (en) * 2003-07-18 2005-01-20 Avinash Chidambaram Graphical interface for configuring a power supply controller
US9275105B2 (en) 2003-09-23 2016-03-01 Salesforce.Com, Inc. System and methods of improving a multi-tenant database query using contextual knowledge about non-homogeneously distributed tenant data
US8732157B2 (en) 2003-09-23 2014-05-20 Salesforce.Com, Inc. Query optimization in a multi-tenant database system
US8229922B2 (en) 2003-09-23 2012-07-24 Salesforce.Com, Inc. Query optimization in a multi-tenant database system
US10152508B2 (en) 2003-09-23 2018-12-11 Salesforce.Com, Inc. Improving a multi-tenant database query using contextual knowledge about tenant data
US8423535B2 (en) 2003-09-23 2013-04-16 Salesforce.Com, Inc. Query optimization in a multi-tenant database system
US8543566B2 (en) 2003-09-23 2013-09-24 Salesforce.Com, Inc. System and methods of improving a multi-tenant database query using contextual knowledge about non-homogeneously distributed tenant data
US20070124276A1 (en) * 2003-09-23 2007-05-31 Salesforce.Com, Inc. Method of improving a query to a database system
US8131713B2 (en) 2003-09-23 2012-03-06 Salesforce.Com, Inc. Distributive storage techniques for multi-tenant databases
US8620954B2 (en) 2003-09-23 2013-12-31 Salesforce.Com, Inc. Query optimization in a multi-tenant database system
US20100211619A1 (en) * 2003-09-23 2010-08-19 Salesforce.Com, Inc. Distributive storage techniques for multi-tenant databases
US20060116898A1 (en) * 2003-11-18 2006-06-01 Peterson Gary E Interactive risk management system and method with reputation risk management
US20050108080A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US20050108083A1 (en) * 2003-11-18 2005-05-19 Peterson Gary E. Interactive risk management system and method
US7707511B2 (en) * 2003-11-18 2010-04-27 Gary Edward Peterson Interactive risk management system and method
US8954420B1 (en) 2003-12-31 2015-02-10 Google Inc. Methods and systems for improving a search ranking using article information
US10423679B2 (en) 2003-12-31 2019-09-24 Google Llc Methods and systems for improving a search ranking using article information
US20050149498A1 (en) * 2003-12-31 2005-07-07 Stephen Lawrence Methods and systems for improving a search ranking using article information
US10291715B1 (en) * 2004-01-27 2019-05-14 Amazon Technologies, Inc. Controlling access to services via usage models
US7698159B2 (en) 2004-02-13 2010-04-13 Genworth Financial Inc. Systems and methods for performing data collection
US20100070864A1 (en) * 2004-02-19 2010-03-18 Allen Mark G System for generating and displaying community awareness management data
US8271305B2 (en) * 2004-02-20 2012-09-18 Accenture Global Services Limited Account level participation for underwriting components
US20100205015A1 (en) * 2004-02-20 2010-08-12 Accenture Global Services Gmbh Account level participation for underwriting components
US20050198565A1 (en) * 2004-02-20 2005-09-08 Mcchrystal Peter S. Method and apparatus for automatic update ad notification of documents and document components stored in a document repository
US9311408B2 (en) 2004-03-31 2016-04-12 Google, Inc. Methods and systems for processing media files
US8626739B2 (en) 2004-03-31 2014-01-07 Google Inc. Methods and systems for processing media files
US9672232B1 (en) 2004-03-31 2017-06-06 Google Inc. Systems and methods for selectively storing event data
US8631076B1 (en) 2004-03-31 2014-01-14 Google Inc. Methods and systems for associating instant messenger events
US8812515B1 (en) * 2004-03-31 2014-08-19 Google Inc. Processing contact information
US8965873B2 (en) 2004-03-31 2015-02-24 Google Inc. Methods and systems for eliminating duplicate events
US9189553B2 (en) 2004-03-31 2015-11-17 Google Inc. Methods and systems for prioritizing a crawl
US10713230B2 (en) 2004-04-02 2020-07-14 Salesforce.Com, Inc. Custom entities and fields in a multi-tenant database system
US20050240483A1 (en) * 2004-04-26 2005-10-27 Shinobu Ito Document managing system and method
US8856793B2 (en) * 2004-05-11 2014-10-07 International Business Machines Corporation System, method and program for scheduling computer program jobs
US9880876B2 (en) 2004-05-11 2018-01-30 International Business Machines Corporation Scheduling computer program jobs based on historical availability of resources
US10324757B2 (en) 2004-05-11 2019-06-18 International Business Machines Corporation Scheduling computer program jobs
US20050268299A1 (en) * 2004-05-11 2005-12-01 International Business Machines Corporation System, method and program for scheduling computer program jobs
US7769608B1 (en) * 2004-05-27 2010-08-03 Allstate Insurance Company Systems and methods for optimizing property risk ratings
US8046245B1 (en) 2004-05-27 2011-10-25 Allstate Insurance Company Systems and methods for optimizing property risk ratings
US20060242024A1 (en) * 2004-09-02 2006-10-26 Welcomemat Services, Inc. Business method for promoting goods and services of providers
US20100174604A1 (en) * 2004-09-02 2010-07-08 Welcomemat Services, Inc. Business method for promoting goods and services of providers
US8019645B2 (en) 2004-09-02 2011-09-13 Welcomemat Services, Inc. Business method for promoting goods and services of providers
US8282003B2 (en) 2004-09-30 2012-10-09 The Invention Science Fund I, Llc Supply-chain side assistance
US20100223162A1 (en) * 2004-09-30 2010-09-02 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supply-chain side assistance
US9747579B2 (en) 2004-09-30 2017-08-29 The Invention Science Fund I, Llc Enhanced user assistance
US20060075344A1 (en) * 2004-09-30 2006-04-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Providing assistance
US10445799B2 (en) 2004-09-30 2019-10-15 Uber Technologies, Inc. Supply-chain side assistance
US20060080188A1 (en) * 2004-09-30 2006-04-13 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supply-chain side assistance
US9038899B2 (en) 2004-09-30 2015-05-26 The Invention Science Fund I, Llc Obtaining user assistance
US7922086B2 (en) 2004-09-30 2011-04-12 The Invention Science Fund I, Llc Obtaining user assistance
US10687166B2 (en) 2004-09-30 2020-06-16 Uber Technologies, Inc. Obtaining user assistance
US20060076398A1 (en) * 2004-09-30 2006-04-13 Searete Llc Obtaining user assistance
US20080229198A1 (en) * 2004-09-30 2008-09-18 Searete Llc, A Limited Liability Corporaiton Of The State Of Delaware Electronically providing user assistance
US10872365B2 (en) 2004-09-30 2020-12-22 Uber Technologies, Inc. Supply-chain side assistance
US8762839B2 (en) 2004-09-30 2014-06-24 The Invention Science Fund I, Llc Supply-chain side assistance
US9098826B2 (en) 2004-09-30 2015-08-04 The Invention Science Fund I, Llc Enhanced user assistance
US8704675B2 (en) 2004-09-30 2014-04-22 The Invention Science Fund I, Llc Obtaining user assistance
US20060173816A1 (en) * 2004-09-30 2006-08-03 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Enhanced user assistance
US20070038529A1 (en) * 2004-09-30 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supply-chain side assistance
US7694881B2 (en) 2004-09-30 2010-04-13 Searete Llc Supply-chain side assistance
US20070040013A1 (en) * 2004-09-30 2007-02-22 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obtaining user assistance
US20060090132A1 (en) * 2004-10-26 2006-04-27 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Enhanced user assistance
US8341522B2 (en) 2004-10-27 2012-12-25 The Invention Science Fund I, Llc Enhanced contextual user assistance
US20060086781A1 (en) * 2004-10-27 2006-04-27 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Enhanced contextual user assistance
US9507525B2 (en) 2004-11-05 2016-11-29 Commvault Systems, Inc. Methods and system of pooling storage devices
US20120185657A1 (en) * 2004-11-05 2012-07-19 Parag Gokhale Systems and methods for recovering electronic information from a storage medium
US10191675B2 (en) 2004-11-05 2019-01-29 Commvault Systems, Inc. Methods and system of pooling secondary storage devices
US20060117001A1 (en) * 2004-12-01 2006-06-01 Jung Edward K Enhanced user assistance
US10514816B2 (en) 2004-12-01 2019-12-24 Uber Technologies, Inc. Enhanced user assistance
US20060116979A1 (en) * 2004-12-01 2006-06-01 Jung Edward K Enhanced user assistance
US7664736B2 (en) * 2005-01-18 2010-02-16 Searete Llc Obtaining user assistance
US20060157550A1 (en) * 2005-01-18 2006-07-20 Searete Llc Obtaining user assistance
US20060161526A1 (en) * 2005-01-18 2006-07-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obtaining user assistance
US7798401B2 (en) 2005-01-18 2010-09-21 Invention Science Fund 1, Llc Obtaining user assistance
US9307577B2 (en) 2005-01-21 2016-04-05 The Invention Science Fund I, Llc User assistance
US7712078B1 (en) * 2005-02-02 2010-05-04 Teradata Us, Inc. Techniques for data store population
US20080281848A1 (en) * 2005-04-08 2008-11-13 John Corbett Method to share and exchange geographic based information
US20080065329A1 (en) * 2005-04-14 2008-03-13 Baron Services, Inc. System and Method for Displaying Storm Tracks
US7657946B2 (en) * 2005-04-14 2010-02-02 International Business Machines Corporation Method for device dependent access control for device independent web content
US20060236408A1 (en) * 2005-04-14 2006-10-19 International Business Machines Corporation Method and apparatus for device dependent access control for device independent web content
US20100017129A1 (en) * 2005-04-14 2010-01-21 Baron Services, Inc. System and Method for Displaying Storm Tracks
US20080235811A1 (en) * 2005-04-14 2008-09-25 Shunguo Yan Method for Device Dependent Access Control for Device Independent Web Content
US7584054B2 (en) * 2005-04-14 2009-09-01 Baron Services, Inc. System and method for displaying storm tracks
US20090119133A1 (en) * 2005-07-07 2009-05-07 Yeransian Luke W Method and system for policy underwriting and risk management over a network
US20090198523A1 (en) * 2005-08-24 2009-08-06 Swiss Reinsurance Company Computer system and method for determining an insurance rate
US10235148B2 (en) 2005-09-09 2019-03-19 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US11314494B2 (en) 2005-09-09 2022-04-26 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US9069803B2 (en) 2005-09-09 2015-06-30 Salesforce.Com, Inc. Application installation system, method and computer program product for allowing a package to be installed by a third party
US11704102B2 (en) 2005-09-09 2023-07-18 Salesforce, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US8244759B2 (en) * 2005-09-09 2012-08-14 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US9009117B2 (en) 2005-09-09 2015-04-14 Salesforce.Com, Inc. System, method and computer program product for validating one or more metadata objects
US9740466B2 (en) * 2005-09-09 2017-08-22 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US20100223284A1 (en) * 2005-09-09 2010-09-02 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US9298750B2 (en) 2005-09-09 2016-03-29 Salesforce.Com, Inc. System, method and computer program product for validating one or more metadata objects
US8903851B2 (en) 2005-09-09 2014-12-02 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US10521211B2 (en) 2005-09-09 2019-12-31 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US9195687B2 (en) 2005-09-09 2015-11-24 Salesforce.Com, Inc. System, method and computer program product for validating one or more metadata objects
US8799233B2 (en) 2005-09-09 2014-08-05 Salesforce.Com, Inc. System, method and computer program product for validating one or more metadata objects
US10691437B2 (en) 2005-09-09 2020-06-23 Salesforce.Com, Inc. Application directory for a multi-user computer system environment
US9378227B2 (en) 2005-09-09 2016-06-28 Salesforce.Com, Inc. Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment
US20100030646A1 (en) * 2005-12-13 2010-02-04 Yahoo! Inc. System for providing location predictive advertising
US7848764B2 (en) 2005-12-13 2010-12-07 Yahoo! Inc. System for providing location predictive advertising
US20100029299A1 (en) * 2005-12-13 2010-02-04 Yahoo! Inc. System for geographically contextualizing data items
US7853270B2 (en) 2005-12-13 2010-12-14 Yahoo! Inc. System for geographically contextualizing data items
US20070150199A1 (en) * 2005-12-13 2007-06-28 Soren Riise System and method for geo-coding using spatial geometry
US20070146374A1 (en) * 2005-12-13 2007-06-28 Sorren Riise System and method for creating minimum bounding rectangles for use in a geo-coding system
US8050689B2 (en) * 2005-12-13 2011-11-01 Yahoo! Inc. System and method for creating minimum bounding rectangles for use in a geo-coding system
US10468139B1 (en) 2005-12-28 2019-11-05 United Services Automobile Association Systems and methods of automating consideration of low body mass risk
US11232379B2 (en) 2006-02-15 2022-01-25 Allstate Insurance Company Retail deployment model
US10255640B1 (en) 2006-02-15 2019-04-09 Allstate Insurance Company Retail location services
US9483767B2 (en) 2006-02-15 2016-11-01 Allstate Insurance Company Retail location services
US12086888B2 (en) 2006-02-15 2024-09-10 Allstate Insurance Company Retail deployment model
US8041648B2 (en) 2006-02-15 2011-10-18 Allstate Insurance Company Retail location services
US20070192347A1 (en) * 2006-02-15 2007-08-16 Allstate Insurance Company Retail Deployment Model
US8219535B1 (en) 2006-02-15 2012-07-10 Allstate Insurance Company Retail deployment model
US11587178B2 (en) 2006-02-15 2023-02-21 Allstate Insurance Company Retail deployment model
US8805805B1 (en) 2006-02-15 2014-08-12 Allstate Insurance Company Retail deployment model
US9619816B1 (en) 2006-02-15 2017-04-11 Allstate Insurance Company Retail deployment model
US8938432B2 (en) * 2006-02-15 2015-01-20 Allstate Insurance Company Retail deployment model
US11004153B2 (en) 2006-02-15 2021-05-11 Allstate Insurance Company Retail location services
US11935126B2 (en) 2006-02-15 2024-03-19 Allstate Insurance Company Retail location services
US20070204277A1 (en) * 2006-02-27 2007-08-30 Burgess Andrew L Jr Computer program and method for managing implementation of a process
US20070203759A1 (en) * 2006-02-27 2007-08-30 Guy Carpenter & Company Portfolio management system with gradient display features
US20070223841A1 (en) * 2006-03-23 2007-09-27 Weinzapfel Robert A Methods of characterizing the probability of wind impact
US20070221743A1 (en) * 2006-03-23 2007-09-27 Weinzapfel Robert A Methods of calculating impact time for storms
US10681199B2 (en) 2006-03-24 2020-06-09 Uber Technologies, Inc. Wireless device with an aggregate user interface for controlling other devices
US11012552B2 (en) 2006-03-24 2021-05-18 Uber Technologies, Inc. Wireless device with an aggregate user interface for controlling other devices
US20070244935A1 (en) * 2006-04-14 2007-10-18 Cherkasov Aleksey G Method, system, and computer-readable medium to provide version management of documents in a file management system
US9549065B1 (en) 2006-05-22 2017-01-17 Convergys Customer Management Delaware Llc System and method for automated customer service with contingent live interaction
US20070275266A1 (en) * 2006-05-25 2007-11-29 Idemitsu Kosan Co., Ltd. Organic electroluminescence device
US8191140B2 (en) * 2006-05-31 2012-05-29 The Invention Science Fund I, Llc Indicating a security breach of a protected set of files
US20070283435A1 (en) * 2006-05-31 2007-12-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Receiving an indication of a security breach of a protected set of files
US8209755B2 (en) 2006-05-31 2012-06-26 The Invention Science Fund I, Llc Signaling a security breach of a protected set of files
US20080022400A1 (en) * 2006-05-31 2008-01-24 Searete Llc, A Limited Liablity Corporation Of The State Of Delaware Indicating a security breach of a protected set of files
US8640247B2 (en) 2006-05-31 2014-01-28 The Invention Science Fund I, Llc Receiving an indication of a security breach of a protected set of files
US20070282723A1 (en) * 2006-05-31 2007-12-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Monitoring a status of a database by placing a false identifier in the database
US20080055096A1 (en) * 2006-06-09 2008-03-06 Aylward James A Real-time modeling analysis of hazards data with large numbers of locations and with customized reporting and web-based delivery
US7991638B1 (en) * 2006-06-21 2011-08-02 Sprint Communications Company L.P. Process for trade area generation
US8027868B1 (en) 2006-06-21 2011-09-27 Sprint Communications Company L.P. Trade area analyzer
US8533818B1 (en) * 2006-06-30 2013-09-10 Symantec Corporation Profiling backup activity
US8635140B2 (en) 2006-07-31 2014-01-21 Insight Catastrophe Group, Llc Apparatuses, methods, and systems for providing a reconfigurable insurance quote generator user interface
US20130346114A1 (en) * 2006-07-31 2013-12-26 Richard Ziade Apparatuses, methods, and systems for providing a risk evaluation product builder user interface
US8442893B2 (en) * 2006-07-31 2013-05-14 Insight Catastrophe Solutions, Llc Apparatuses, methods and systems for providing a risk evaluation product builder user interface
US20110213811A1 (en) * 2006-07-31 2011-09-01 Insight Catastrophe Solutions Apparatuses, Methods and Systems for Providing a Risk Evaluation Product Builder User Interface
US8886853B2 (en) 2006-09-22 2014-11-11 Commvault Systems, Inc. Systems and methods for uniquely identifying removable media by its manufacturing defects wherein defects includes bad memory or redundant cells or both
US9213994B2 (en) 2006-10-17 2015-12-15 Corelogic Solutions, Llc Systems and methods for quantifying flood risk
US7917292B1 (en) 2006-10-17 2011-03-29 Jpmorgan Chase Bank, N.A. Systems and methods for flood risk assessment
US8655595B1 (en) 2006-10-17 2014-02-18 Corelogic Solutions, Llc Systems and methods for quantifying flood risk
US20080103837A1 (en) * 2006-10-25 2008-05-01 Microsoft Corporation Risk reduction for participants in an online advertising exchange
US8027950B1 (en) * 2006-10-27 2011-09-27 Bnsf Railway Company Electronic file creation and management systems and methods
US7774306B1 (en) * 2006-10-27 2010-08-10 Bnsf Railway Company Electronic file creation and management systems and methods
US8649567B1 (en) 2006-11-17 2014-02-11 Corelogic Solutions, Llc Displaying a flood change map with change designators
US8077927B1 (en) 2006-11-17 2011-12-13 Corelogic Real Estate Solutions, Llc Updating a database with determined change identifiers
US8542884B1 (en) 2006-11-17 2013-09-24 Corelogic Solutions, Llc Systems and methods for flood area change detection
WO2008064334A3 (fr) * 2006-11-21 2008-07-17 American Int Group Inc Procédé et système de détermination de tarification d'assurance
WO2008064334A2 (fr) * 2006-11-21 2008-05-29 American International Group, Inc. Procédé et système de détermination de tarification d'assurance
US9070176B2 (en) 2006-12-05 2015-06-30 Corelogic Solutions, Llc Systems and methods for tracking parcel data acquisition
US8078594B1 (en) 2006-12-05 2011-12-13 Corelogic Real Estate Solutions, Llc Parcel data acquisition and processing
US9105070B2 (en) 2006-12-05 2015-08-11 Corelogic Solutions, Llc Systems and methods for tracking parcel data acquisition
US7890509B1 (en) 2006-12-05 2011-02-15 First American Real Estate Solutions Llc Parcel data acquisition and processing
US9754334B2 (en) 2006-12-05 2017-09-05 Corelogic Solutions, Llc Systems and methods for tracking parcel data acquisition
US8538918B1 (en) 2006-12-05 2013-09-17 Corelogic Solutions, Llc Systems and methods for tracking parcel data acquisition
US9766843B2 (en) 2006-12-13 2017-09-19 The Toronto-Dominion Bank Document output processing
US10178248B2 (en) 2006-12-13 2019-01-08 The Toronto-Dominion Bank Computing device for generating a document by combining content data with form data
US9612785B2 (en) 2006-12-13 2017-04-04 The Toronto-Dominion Bank Document output processing
US9854109B2 (en) 2006-12-13 2017-12-26 The Toronto-Dominion Bank Document output processing
US20080144130A1 (en) * 2006-12-13 2008-06-19 Kerigan Thomas M Document output processing
US9612786B2 (en) 2006-12-13 2017-04-04 The Toronto-Dominion Bank Document output processing
US10339539B2 (en) * 2006-12-19 2019-07-02 Celeritasworks, Llc Campaign awareness management systems and methods
US20080154675A1 (en) * 2006-12-19 2008-06-26 Celeritasworks, Llc Campaign awareness management systems and methods
US10783526B2 (en) 2006-12-19 2020-09-22 Celeritasworks, Llc Campaign awareness management systems and methods
US11956251B2 (en) 2006-12-28 2024-04-09 Perftech, Inc. System, method and computer readable medium for determining users of an internet service
US20080235062A1 (en) * 2006-12-29 2008-09-25 American International Group, Inc. Method and system for initially projecting an insurance company's net loss from a major loss event
US20090063200A1 (en) * 2006-12-29 2009-03-05 American International Group, Inc. Method and system for initially projecting an insurance company's net loss from a major loss event using a networked common information repository
US20080228403A1 (en) * 2007-03-16 2008-09-18 Johan Olof Anders Robertsson Technique to Provide Seismic Data-Based Products
US7426438B1 (en) * 2007-03-16 2008-09-16 Westerngeco L.L.C. Technique to provide seismic data-based products
US8219523B2 (en) * 2007-03-23 2012-07-10 Sap Ag Data quality enrichment integration and evaluation system
US20080235288A1 (en) * 2007-03-23 2008-09-25 Ben Harush Yossi Data quality enrichment integration and evaluation system
US11348676B2 (en) * 2007-04-25 2022-05-31 Canon Kabushiki Kaisha Medical examination system control apparatus and control method therefor
US9898549B1 (en) * 2007-05-08 2018-02-20 Progress Software Corporation Tenant-aware database for software as a service
US20080300924A1 (en) * 2007-06-01 2008-12-04 American International Group, Inc. Method and system for projecting catastrophe exposure
US20080313224A1 (en) * 2007-06-12 2008-12-18 Griffith Frank P System and Method for Integration of Data Records Having Differing Data Types to a Geographical Information System
US7984052B2 (en) * 2007-06-12 2011-07-19 Raytheon Company System and method for integration of data records having differing data types to a geographical information system
US8996823B2 (en) 2007-08-30 2015-03-31 Commvault Systems, Inc. Parallel access virtual tape library and drives
US8370178B1 (en) * 2007-10-15 2013-02-05 United Services Automobile Association (Usaa) Systems and methods for marketing and/or servicing personal property insurance
US8712807B2 (en) 2007-10-17 2014-04-29 Hartford Fire Insurance Company System and method for determining payroll related insurance premiums
US8355971B2 (en) 2007-10-17 2013-01-15 Hartford Fire Insurance Company System and method for processing payroll related insurance premiums
US20100094666A1 (en) * 2007-10-17 2010-04-15 Hartford Fire Insurance Company System and method for processing and transmitting payroll-related data for insurance transactions
US8515787B2 (en) 2007-10-17 2013-08-20 Hartford Fire Insurance Company System and method for processing and transmitting payroll-related data for insurance transactions
US8639539B2 (en) 2007-10-17 2014-01-28 Hartford Fire Insurance Company System and method for processing payroll-related insurance data
US8112333B2 (en) 2007-10-17 2012-02-07 Hartford Fire Insurance Company System and method for processing payroll related insurance premiums
US8452623B2 (en) 2007-10-17 2013-05-28 Hartford Fire Insurance Company System and method for processing payroll-related employee and insurance data
US20090106053A1 (en) * 2007-10-17 2009-04-23 Mervin Walker System and method for processing payroll related insurance premiums
US8775960B1 (en) * 2008-03-10 2014-07-08 United Services Automobile Association (Usaa) Systems and methods for geographic mapping and review
US10380691B1 (en) * 2008-04-03 2019-08-13 United Services Automobile Association (Usaa) Location variable insurance
WO2009146184A3 (fr) * 2008-04-15 2010-01-21 Metropolitan Life Insurance Co. Procede et systeme permettant d’evaluer un risque d’assurance
WO2009146184A2 (fr) * 2008-04-15 2009-12-03 Metropolitan Life Insurance Co. Procede et systeme permettant d’evaluer un risque d’assurance
US20100070309A1 (en) * 2008-04-15 2010-03-18 Deede Martin W Method and System for Assessing Insurance Risk
US20100036684A1 (en) * 2008-05-15 2010-02-11 American International Group, Inc. Method and system of insuring risk
US8260638B2 (en) * 2008-05-15 2012-09-04 American International Group, Inc. Method and system of insuring risk
WO2009140592A1 (fr) * 2008-05-15 2009-11-19 American International Group, Inc. Procédé et système pour s'assurer contre les risques opérationnels
US11151264B2 (en) 2008-06-03 2021-10-19 Salesforce.Com, Inc. Method and system for controlling access to a multi-tenant database system using a virtual portal
US9361366B1 (en) 2008-06-03 2016-06-07 Salesforce.Com, Inc. Method and system for controlling access to a multi-tenant database system using a virtual portal
US8589474B2 (en) * 2008-06-17 2013-11-19 Go Daddy Operating Company, LLC Systems and methods for software and file access via a domain name
US20090313321A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Branded and comarketed domain-based thin client system
US9002984B2 (en) * 2008-06-17 2015-04-07 Go Daddy Operating Company, LLC Direct domain software and file access computer system
US20090313363A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Hosting a remote computer in a hosting data center
US20090313320A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Branded and comarketed domain-based thick client system
US20090313364A1 (en) * 2008-06-17 2009-12-17 The Go Daddy Group, Inc. Direct domain software and file access computer system
US9002985B2 (en) 2008-06-17 2015-04-07 Go Daddy Operating Company, LLC Branded and comarketed domain-based thick client system
US20190245888A1 (en) * 2008-06-19 2019-08-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US20160112453A1 (en) * 2008-06-19 2016-04-21 Servicemesh, Inc. System and method for a cloud computing abstraction layer with security zone facilities
WO2009155618A2 (fr) * 2008-06-19 2009-12-23 Trustco Group International (Pty) Ltd Système de facilitation de transactions
US10880189B2 (en) 2008-06-19 2020-12-29 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US9489647B2 (en) 2008-06-19 2016-11-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US9973474B2 (en) 2008-06-19 2018-05-15 Csc Agility Platform, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US9658868B2 (en) 2008-06-19 2017-05-23 Csc Agility Platform, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
WO2009155618A3 (fr) * 2008-06-19 2010-02-11 Trustco Group International (Pty) Ltd Système de facilitation de transactions
US20210014275A1 (en) * 2008-06-19 2021-01-14 Csc Agility Platform, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US11042279B2 (en) * 2008-06-22 2021-06-22 Tableau Software, Inc. Generating graphical marks for graphical views of a data source
US9933928B2 (en) * 2008-06-22 2018-04-03 Tableau Software, Inc. Selecting the type of visual marks in data visualizations based on user-selected visual properties of the marks
US10430059B2 (en) * 2008-06-22 2019-10-01 Tableau Software, Inc. Methods and systems of generating graphical marks in a graphical view region of a user interface
US20150007074A1 (en) * 2008-06-22 2015-01-01 Tableau Software, Inc. Selecting the Type of Visual Marks in Data Visualizations Based on User-Selected Visual Properties of the Marks
US8473518B1 (en) 2008-07-03 2013-06-25 Salesforce.Com, Inc. Techniques for processing group membership data in a multi-tenant database system
US9411852B2 (en) 2008-07-03 2016-08-09 Salesforce.Com, Inc. Techniques for processing group membership data in a multi-tenant database system
US20100010837A1 (en) * 2008-07-09 2010-01-14 Hartford Fire Insurance Company System and method for use in billing for group benefit insurance
US20100036677A1 (en) * 2008-08-07 2010-02-11 Humana Inc. Computerized settlement and invoice validation system for healthcare services
US8744879B2 (en) 2008-08-12 2014-06-03 Victor Bodansky System and method for insurance product development
WO2010019497A1 (fr) * 2008-08-12 2010-02-18 Victor Bodansky Système et procédé de développement de produits d'assurance
US20100042444A1 (en) * 2008-08-12 2010-02-18 Victor Bodansky System and method for insurance product development
WO2010027633A2 (fr) * 2008-08-25 2010-03-11 Flightsurance Gmbh Assurance contre accident de vol à la demande
WO2010027633A3 (fr) * 2008-08-25 2010-05-27 Flightsurance Gmbh Assurance contre accident de vol à la demande
US8224676B2 (en) 2008-08-25 2012-07-17 Flightsurance Gmbh On-demand flight accident insurance
US20100049553A1 (en) * 2008-08-25 2010-02-25 Jens Ortgiese On-Demand Flight Accident Insurance
US8423389B2 (en) 2008-08-25 2013-04-16 Flightsurance Gmbh Flight accident insurance
US8725541B2 (en) * 2008-09-10 2014-05-13 Hartford Fire Insurance Company Systems and methods for rating and pricing insurance policies
US20100063851A1 (en) * 2008-09-10 2010-03-11 David Andrist Systems and methods for rating and pricing insurance policies
US10547678B2 (en) 2008-09-15 2020-01-28 Commvault Systems, Inc. Data transfer techniques within data storage devices, such as network attached storage performing data migration
US10884387B2 (en) 2008-09-29 2021-01-05 International Business Machines Corporation System and method to dynamically change data center partitions
US20100082178A1 (en) * 2008-09-29 2010-04-01 International Business Machines Corporation System and method to dynamically change data center partitions
US8983675B2 (en) * 2008-09-29 2015-03-17 International Business Machines Corporation System and method to dynamically change data center partitions
US9939796B2 (en) 2008-09-29 2018-04-10 International Business Machines Corporation System and method to dynamically change data center partitions
US8719119B1 (en) 2008-09-30 2014-05-06 Accenture Global Services Limited Post deployment query system
US8595103B1 (en) * 2008-09-30 2013-11-26 Accenture Global Services Limited Deployment and release component system
US8788295B1 (en) 2008-09-30 2014-07-22 Accenture Global Services Limited Reusable product system
US9203865B2 (en) * 2008-12-19 2015-12-01 Watchguard Technologies, Inc. Cluster architecture for network security processing
US20100162383A1 (en) * 2008-12-19 2010-06-24 Watchguard Technologies, Inc. Cluster Architecture for Network Security Processing
US20130191881A1 (en) * 2008-12-19 2013-07-25 Watchguard Technologies, Inc. Cluster architecture for network security processing
US8392496B2 (en) * 2008-12-19 2013-03-05 Watchguard Technologies, Inc. Cluster architecture for network security processing
US8990251B2 (en) 2009-02-11 2015-03-24 Salesforce.Com, Inc. Techniques for changing perceivable stimuli associated with a user interfave for an on-demand database service
US8296321B2 (en) 2009-02-11 2012-10-23 Salesforce.Com, Inc. Techniques for changing perceivable stimuli associated with a user interface for an on-demand database service
US20100278446A1 (en) * 2009-04-30 2010-11-04 Oracle International Corporation Structure of hierarchical compressed data structure for tabular data
US8645337B2 (en) 2009-04-30 2014-02-04 Oracle International Corporation Storing compression units in relational tables
US20100281004A1 (en) * 2009-04-30 2010-11-04 Oracle International Corporation Storing compression units in relational tables
US8356060B2 (en) 2009-04-30 2013-01-15 Oracle International Corporation Compression analyzer
US20100281079A1 (en) * 2009-04-30 2010-11-04 Oracle International Corporation Compression analyzer
US8935223B2 (en) 2009-04-30 2015-01-13 Oracle International Corporation Structure of hierarchical compressed data structure for tabular data
US9559720B2 (en) 2009-04-30 2017-01-31 Oracle International Corporation Compression analyzer
US20120246695A1 (en) * 2009-05-08 2012-09-27 Alexander Cameron Access control of distributed computing resources system and method
WO2010138932A1 (fr) * 2009-05-29 2010-12-02 Paul Bradshaw Protection variable de la vie sur la base d'entrées dynamiques
US10049407B2 (en) 2009-05-29 2018-08-14 Quanis Licensing Ltd. Dynamic aggregation of insurance premiums
US20110004492A1 (en) * 2009-05-29 2011-01-06 Quanis, Inc. Dynamic adjustment of insurance premiums
US20100312584A1 (en) * 2009-05-29 2010-12-09 Quanis, Inc. Dynamic adjustment of insurance coverage
US20110004493A1 (en) * 2009-05-29 2011-01-06 Quanis, Inc. Dynamic aggregation of insurance premiums
US8749381B1 (en) * 2009-06-26 2014-06-10 United Services Automobile Association (Usaa) Systems and methods for automated house damage detection and reporting
US8838894B2 (en) 2009-08-19 2014-09-16 Oracle International Corporation Storing row-major data with an affinity for columns
US8627006B2 (en) 2009-08-19 2014-01-07 Oracle International Corporation Storing row-major data with an affinity for columns
US20110078213A1 (en) * 2009-09-29 2011-03-31 Salesforce.Com, Inc. Techniques for managing functionality changes of an on-demand database system
US11615376B2 (en) 2009-09-29 2023-03-28 Salesforce.Com, Inc. Techniques for managing functionality changes of an on-demand database system
US10482425B2 (en) 2009-09-29 2019-11-19 Salesforce.Com, Inc. Techniques for managing functionality changes of an on-demand database system
US20110106783A1 (en) * 2009-11-03 2011-05-05 Kalbhavi Srinivas Mobile search with a landmark
US10810678B2 (en) 2009-11-04 2020-10-20 Michael Price System and method for automated risk management appraisal
US10055792B2 (en) 2009-11-04 2018-08-21 Michael Price System and method for automated risk management appraisal
US20110106569A1 (en) * 2009-11-04 2011-05-05 Michael Price System and method for automated risk management appraisal
US20110126138A1 (en) * 2009-11-20 2011-05-26 Sony Computer Entertainment Inc. Aiding Device in Creation of Content Involving Image Display According to Scenario and Aiding Method Therein
US8418063B2 (en) * 2009-11-20 2013-04-09 Sony Corporation Aiding device in creation of content involving image display according to scenario and aiding method therein
US8776067B1 (en) 2009-12-11 2014-07-08 Salesforce.Com, Inc. Techniques for utilizing computational resources in a multi-tenant on-demand database system
US8443366B1 (en) 2009-12-11 2013-05-14 Salesforce.Com, Inc. Techniques for establishing a parallel processing framework for a multi-tenant on-demand database system
US20110150470A1 (en) * 2009-12-17 2011-06-23 Tellabs Operations, Inc. Procedure, apparatus, system, and computer program for network planning
US20110153368A1 (en) * 2009-12-17 2011-06-23 XtremeGIS, Inc. User Interactive Reinsurance Risk Analysis Application
US20120232939A1 (en) * 2009-12-17 2012-09-13 Xtreme GIS, Inc. Method for Rendering Layer Images and Providing Information
US8949165B2 (en) * 2009-12-17 2015-02-03 Tellabs Operations, Inc. Procedure, apparatus, system, and computer program for network planning
US20110153560A1 (en) * 2009-12-18 2011-06-23 Victor Bryant Apparatus, method and article to manage electronic or digital documents in networked environment
US9063932B2 (en) 2009-12-18 2015-06-23 Vertafore, Inc. Apparatus, method and article to manage electronic or digital documents in a networked environment
US20110161375A1 (en) * 2009-12-24 2011-06-30 Doug Tedder Systems, methods and articles for template based generation of markup documents to access back office systems
US20110161119A1 (en) * 2009-12-24 2011-06-30 The Travelers Companies, Inc. Risk assessment and control, insurance premium determinations, and other applications using busyness
US8700682B2 (en) 2009-12-24 2014-04-15 Vertafore, Inc. Systems, methods and articles for template based generation of markup documents to access back office systems
US9189090B2 (en) 2010-03-26 2015-11-17 Salesforce.Com, Inc. Techniques for interpreting signals from computer input devices
US20110234482A1 (en) * 2010-03-26 2011-09-29 Salesforce.Com, Inc. Techniques for interpreting signals from computer input devices
US9948721B2 (en) 2010-03-26 2018-04-17 Salesforce.Com, Inc. Methods and systems for providing time and date specific software user interfaces
US10819800B2 (en) 2010-03-26 2020-10-27 Salesforce.Com, Inc. Methods and systems for providing time and date specific software user interfaces
US8977675B2 (en) 2010-03-26 2015-03-10 Salesforce.Com, Inc. Methods and systems for providing time and date specific software user interfaces
US8712805B1 (en) 2010-03-31 2014-04-29 United Services Automobile Association (Usaa) Method and system for providing geohazard information to customers
US11120003B2 (en) * 2010-03-31 2021-09-14 Salesforce.Com, Inc. System, method and computer program product for maintaining data stored in a data structure
US8595181B2 (en) 2010-05-03 2013-11-26 Salesforce.Com, Inc. Report preview caching techniques in a multi-tenant database
US8977739B2 (en) 2010-05-03 2015-03-10 Salesforce.Com, Inc. Configurable frame work for testing and analysis of client-side web browser page performance
US8972431B2 (en) 2010-05-06 2015-03-03 Salesforce.Com, Inc. Synonym supported searches
US9286331B2 (en) 2010-05-06 2016-03-15 Go Daddy Operating Company, LLC Verifying and balancing server resources via stored usage data
US8819632B2 (en) 2010-07-09 2014-08-26 Salesforce.Com, Inc. Techniques for distributing information in a computer network related to a software anomaly
US20150095269A1 (en) * 2010-07-20 2015-04-02 Sparkling Logic, Inc. Contextual Decision Logic Elicitation
US9135574B2 (en) * 2010-07-20 2015-09-15 Sparkling Logic, Inc. Contextual decision logic elicitation
US20130024215A1 (en) * 2010-07-22 2013-01-24 Webcetera, L.P. Insurance quoting application for handheld device
US11127085B2 (en) 2010-07-22 2021-09-21 Webcetera, L.P. Insurance quoting application for handheld device
US9069901B2 (en) 2010-08-19 2015-06-30 Salesforce.Com, Inc. Software and framework for reusable automated testing of computer software systems
US8239421B1 (en) * 2010-08-30 2012-08-07 Oracle International Corporation Techniques for compression and processing optimizations by using data transformations
US20130179394A1 (en) * 2010-09-10 2013-07-11 Alkiviadis Simitsis System and Method for Interpreting and Generating Integration Flows
US8738407B2 (en) 2010-09-10 2014-05-27 State Farm Mutual Automobile Insurance Company Computer readable medium containing a set of computer readable instructions for grid-based insurance rating
US8676613B2 (en) 2010-09-10 2014-03-18 State Farm Mutual Automobile Insurance Company Methods for grid-based insurance rating
US8504393B2 (en) * 2010-09-10 2013-08-06 State Farm Mutual Automobile Insurance Company Systems and methods for grid-based insurance rating
US8738408B2 (en) 2010-09-10 2014-05-27 State Farm Mutual Automobile Insurance Company Methods for grid-based rating insurance products using a programmed computer system
US20120066005A1 (en) * 2010-09-10 2012-03-15 State Farm Mutual Automobile Insurance Company Systems and methods for grid-based insurance rating
US20120072464A1 (en) * 2010-09-16 2012-03-22 Ronen Cohen Systems and methods for master data management using record and field based rules
US8341131B2 (en) * 2010-09-16 2012-12-25 Sap Ag Systems and methods for master data management using record and field based rules
US9557929B2 (en) 2010-09-30 2017-01-31 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
US10983870B2 (en) 2010-09-30 2021-04-20 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
US9244779B2 (en) 2010-09-30 2016-01-26 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
US11640338B2 (en) 2010-09-30 2023-05-02 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
US10275318B2 (en) 2010-09-30 2019-04-30 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
US20130262171A1 (en) * 2010-12-10 2013-10-03 Solodko Properties, Llc System and Method for Directing and Monitoring the Activities of Remote Agents
US9384198B2 (en) 2010-12-10 2016-07-05 Vertafore, Inc. Agency management system and content management system integration
US8682699B2 (en) 2010-12-26 2014-03-25 The Travelers Indemnity Company Systems and methods for customer-related risk zones
US9043358B2 (en) * 2011-03-09 2015-05-26 Microsoft Technology Licensing, Llc Enterprise search over private and public data
US20120233209A1 (en) * 2011-03-09 2012-09-13 Microsoft Corporation Enterprise search over private and public data
US8731973B2 (en) 2011-04-19 2014-05-20 Vertafore, Inc. Overlaying images in automated insurance policy form generation
WO2012158298A2 (fr) * 2011-05-18 2012-11-22 Rga Reinsurance Company Transformation de données pour prendre une décision d'assurabilité
JP2014519647A (ja) * 2011-05-18 2014-08-14 アールジーエイ・リインシュアランス・カンパニー 保険可能性決定を下すためのデータの変換
US8775218B2 (en) 2011-05-18 2014-07-08 Rga Reinsurance Company Transforming data for rendering an insurability decision
WO2012158298A3 (fr) * 2011-05-18 2013-05-02 Rga Reinsurance Company Transformation de données pour prendre une décision d'assurabilité
US20120308967A1 (en) * 2011-06-01 2012-12-06 Shea Armand Broussard Method for Displaying Wildfires and History
US20120311416A1 (en) * 2011-06-03 2012-12-06 Hannes Richter Integrated hazard mapping system
US9268828B2 (en) * 2011-06-15 2016-02-23 Sas Institute Inc. Computer-implemented systems and methods for extract, transform, and load user interface processing
US20120324387A1 (en) * 2011-06-15 2012-12-20 Nancy Anne Rausch Computer-Implemented Systems And Methods For Extract, Transform, And Load User Interface Processing
US20120330959A1 (en) * 2011-06-27 2012-12-27 Raytheon Company Method and Apparatus for Assessing a Person's Security Risk
US20130013344A1 (en) * 2011-07-08 2013-01-10 Ernstberger Kelly A Systems and methods for determining optional insurance coverages
WO2013009585A3 (fr) * 2011-07-09 2013-03-14 The Travelers Indemnity Company Systèmes et procédés de configuration d'un produit
US20130013346A1 (en) * 2011-07-09 2013-01-10 The Travelers Indemnity Company Systems and methods for product configuration
US8438049B2 (en) 2011-08-02 2013-05-07 Hartford Fire Insurance Company System and method for processing data related to group benefit insurance having critical illness coverage
US8538785B2 (en) * 2011-08-19 2013-09-17 Hartford Fire Insurance Company System and method for computing and scoring the complexity of a vehicle trip using geo-spatial information
US20130046559A1 (en) * 2011-08-19 2013-02-21 Hartford Fire Insurance Company System and method for computing and scoring the complexity of a vehicle trip using geo-spatial information
US8799035B2 (en) 2011-08-19 2014-08-05 Hartford Fire Insurance Company System and method for determining an insurance premium based on complexity of a vehicle trip
US20130070645A1 (en) * 2011-09-19 2013-03-21 Fujitsu Network Communications, Inc. Address table flushing in distributed switching systems
US9473424B2 (en) * 2011-09-19 2016-10-18 Fujitsu Limited Address table flushing in distributed switching systems
US20140257862A1 (en) * 2011-11-29 2014-09-11 Wildfire Defense Systems, Inc. Mobile application for risk management
WO2013085500A1 (fr) * 2011-12-07 2013-06-13 Data Insurance Holdings Ltd. Système et procédé de gestion d'assurance pour données électroniques
US10796368B2 (en) 2011-12-07 2020-10-06 Cyber Indemnity Solutions Limited Electronic data insurance management system and method
US10684753B2 (en) 2012-03-28 2020-06-16 The Travelers Indemnity Company Systems and methods for geospatial value subject analysis and management
US11294552B2 (en) 2012-03-28 2022-04-05 The Travelers Indemnity Company Systems and methods for geospatial value subject analysis and management
US20130262153A1 (en) * 2012-03-28 2013-10-03 The Travelers Indemnity Company Systems and methods for certified location data collection, management, and utilization
US10789219B1 (en) 2012-03-28 2020-09-29 Guidewire Software, Inc. Insurance policy processing using questions sets
US9953369B2 (en) 2012-03-28 2018-04-24 The Travelers Indemnity Company Systems and methods for certified location data collection, management, and utilization
US10719882B2 (en) 2012-03-28 2020-07-21 The Travelers Indemnity Company Systems and methods for certified location data collection, management, and utilization
US10318542B2 (en) 2012-03-30 2019-06-11 Commvault Systems, Inc. Information management of mobile device data
US9529871B2 (en) 2012-03-30 2016-12-27 Commvault Systems, Inc. Information management of mobile device data
US20130339053A1 (en) * 2012-04-11 2013-12-19 Children's National Medical Center Regional analysis of electronic health record data using geographic information systems and statistical data mining
US20130282407A1 (en) * 2012-04-19 2013-10-24 Eric William Snyder Apparatus, method and article to automate and manage communications in a networked environment
US20130283141A1 (en) * 2012-04-20 2013-10-24 Latitude Geographics Group Ltd. Client Agnostic Spatial Workflow Form Definition and Rendering
US9990608B2 (en) 2012-05-01 2018-06-05 Innovation Specialists Virtual professionals community for conducting virtual consultations with suggested professionals
US10395328B2 (en) 2012-05-01 2019-08-27 Innovation Specialists Llc Virtual professionals community for conducting virtual consultations with suggested professionals
US8996545B2 (en) * 2012-05-02 2015-03-31 Sap Se In-memory spatial database for geocoding/geoprocessing
CN103383688A (zh) * 2012-05-02 2013-11-06 Sap股份公司 用于地理编码/地理处理的内存空间数据库
US20130297556A1 (en) * 2012-05-02 2013-11-07 Yingyu Chen In-memory spatial database for geocoding/geoprocessing
CN107103402A (zh) * 2012-07-05 2017-08-29 弗莱克斯电子有限责任公司 用于控制供应链的方法和系统
US10146214B2 (en) 2012-07-05 2018-12-04 Flextronics Ap, Llc Method and system for collecting supply chain performance information
US20140018951A1 (en) * 2012-07-05 2014-01-16 Flextronics Ap, Llc Method and system for determining and managing supply chain risk
US8645332B1 (en) 2012-08-20 2014-02-04 Sap Ag Systems and methods for capturing data refinement actions based on visualized search of information
WO2014055057A1 (fr) * 2012-10-04 2014-04-10 Nesgos Peter D Système et procédé de gestion de risque d'investissement dans des compagnies d'opérateurs de satellites
US10810526B2 (en) 2012-11-16 2020-10-20 Planet Social, LLC Server for selecting a sequential task-oriented event and methods for use therewith
US20170134527A1 (en) * 2012-11-16 2017-05-11 Planet Social, LLC Server for selecting a sequential task-oriented event and methods for use therewith
US10482408B2 (en) 2012-11-16 2019-11-19 Planet Social, LLC Event wizard server and methods for use therewith
US9600144B2 (en) * 2012-11-16 2017-03-21 Planet Social, LLC Server for selecting a sequential task-oriented event and methods for use therewith
US10387814B2 (en) 2012-11-16 2019-08-20 Planet Social, LLC Server for selecting a sequential task-oriented event and methods for use therewith
US9860343B2 (en) * 2012-11-16 2018-01-02 Planet Social, LLC Server for selecting a sequential task-oriented event and methods for use therewith
US20140143312A1 (en) * 2012-11-16 2014-05-22 Planet Social, LLC Server for selecting a sequential task-oriented event and methods for use therewith
US9678627B2 (en) 2012-11-16 2017-06-13 Planet Social, LLC Event wizard server and methods for use therewith
US9160809B2 (en) 2012-11-26 2015-10-13 Go Daddy Operating Company, LLC DNS overriding-based methods of accelerating content delivery
US20140156591A1 (en) * 2012-12-03 2014-06-05 Ut-Battelle, Llc Knowledge catalysts
US10373263B1 (en) * 2012-12-03 2019-08-06 Guidewire Software, Inc. Extensible infrastructure for managing workflow on a plurality of installed application components that interact with a central hosted component
US9489695B1 (en) * 2012-12-03 2016-11-08 Guidewire Software, Inc. Extensible infrastructure for managing workflow on a plurality of installed application components that interact with a central hosted component
US10127292B2 (en) * 2012-12-03 2018-11-13 Ut-Battelle, Llc Knowledge catalysts
US11847705B2 (en) * 2012-12-21 2023-12-19 The Travelers Indemnity Company Systems and methods for surface segment data
US10255638B2 (en) 2012-12-21 2019-04-09 The Travelers Indemnity Company Systems and methods for surface segment data
US11030700B2 (en) 2012-12-21 2021-06-08 The Travelers Indemnity Company Systems and methods for surface segment data
US20210201424A1 (en) * 2012-12-21 2021-07-01 The Travelers Indemnity Company Systems and methods for surface segment data
US10303559B2 (en) 2012-12-27 2019-05-28 Commvault Systems, Inc. Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system
US11243849B2 (en) 2012-12-27 2022-02-08 Commvault Systems, Inc. Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system
US9069799B2 (en) 2012-12-27 2015-06-30 Commvault Systems, Inc. Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system
US9384208B2 (en) 2013-01-22 2016-07-05 Go Daddy Operating Company, LLC Configuring a cached website file removal using a pulled data list
US9141669B2 (en) 2013-01-22 2015-09-22 Go Daddy Operating Company, LLC Configuring an origin server content delivery using a pulled data list
US20150371227A1 (en) * 2013-01-30 2015-12-24 Barclays Bank Plc Registering a Mobile User
US9438493B2 (en) 2013-01-31 2016-09-06 Go Daddy Operating Company, LLC Monitoring network entities via a central monitoring system
US20140245165A1 (en) * 2013-02-28 2014-08-28 Donan Engineering Co., Inc. Systems and methods for collecting and representing attributes related to damage in a geographic area
US20140245210A1 (en) * 2013-02-28 2014-08-28 Donan Engineering Co., Inc. Systems and Methods for Collecting and Representing Attributes Related to Damage in a Geographic Area
US20140277605A1 (en) * 2013-03-15 2014-09-18 Fisher-Rosemount Systems, Inc. Mobile analysis of physical phenomena in a process plant
US10031490B2 (en) * 2013-03-15 2018-07-24 Fisher-Rosemount Systems, Inc. Mobile analysis of physical phenomena in a process plant
US10411975B2 (en) 2013-03-15 2019-09-10 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with multi-tier deployment policy
US20140304007A1 (en) * 2013-04-05 2014-10-09 The Travelers Indemnity Company Systems and methods for account-level flood risk assessment
US9378100B2 (en) 2013-05-17 2016-06-28 Go Daddy Operating Company, LLC Tools for storing, accessing and restoring website content via a website repository
WO2014193839A1 (fr) * 2013-05-31 2014-12-04 Innodata Synodex, Llc Procédé pour générer un groupe sélectionné de polices d'assurance émises
US10262373B2 (en) 2013-06-07 2019-04-16 State Farm Mutual Automobile Insurance Company Systems and methods for grid-based insurance rating
US10650466B1 (en) 2013-06-07 2020-05-12 State Farm Mutual Automobile Insurance Company Systems and methods for grid-based insurance rating
US20150006569A1 (en) * 2013-06-28 2015-01-01 James Warner Method and apparatus for preparing disaster alert notice report
US20150019262A1 (en) * 2013-07-11 2015-01-15 Corelogic Solutions, Llc Method and system for generating a flash flood risk score
US10339486B1 (en) 2013-09-04 2019-07-02 Allstate Insurance Company Agency business planning tool
US11954632B1 (en) 2013-09-04 2024-04-09 Allstate Insurance Company Agency business planning tool
US10839331B1 (en) 2013-09-04 2020-11-17 Allstate Insurance Company Agency business planning tool
US10860598B2 (en) 2013-09-19 2020-12-08 Workday, Inc. Systems and methods for interest-driven business intelligence systems including event-oriented data
US9892178B2 (en) 2013-09-19 2018-02-13 Workday, Inc. Systems and methods for interest-driven business intelligence systems including event-oriented data
US10922329B2 (en) 2013-09-19 2021-02-16 Workday, Inc. Systems and methods for interest-driven business intelligence systems including geo-spatial data
US10140346B2 (en) * 2013-09-19 2018-11-27 Workday, Inc. Systems and methods for interest-driven business intelligence systems including geo-spatial data
US20150081619A1 (en) * 2013-09-19 2015-03-19 Platfora, Inc. Systems and Methods for Interest-Driven Business Intelligence Systems Including Geo-Spatial Data
US12051113B2 (en) 2013-12-06 2024-07-30 Guidewire Software, Inc. Inter-frame communication
US10607161B2 (en) * 2013-12-06 2020-03-31 Guidewire Software, Inc. Processing insurance related address information
US10417588B1 (en) * 2013-12-06 2019-09-17 Guidewire Software, Inc. Processing insurance related address information
US10902522B1 (en) 2013-12-06 2021-01-26 Guidewire Software, Inc. Inter-frame communication
US9507814B2 (en) 2013-12-10 2016-11-29 Vertafore, Inc. Bit level comparator systems and methods
US9367435B2 (en) 2013-12-12 2016-06-14 Vertafore, Inc. Integration testing method and system for web services
US11158003B1 (en) 2013-12-23 2021-10-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US11854088B1 (en) 2013-12-23 2023-12-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US10489861B1 (en) 2013-12-23 2019-11-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US11727499B1 (en) 2013-12-23 2023-08-15 Massachusetts Mutual Life Insurance Company Method of evaluating heuristics outcome in the underwriting process
US11403711B1 (en) 2013-12-23 2022-08-02 Massachusetts Mutual Life Insurance Company Method of evaluating heuristics outcome in the underwriting process
US20150178850A1 (en) * 2013-12-24 2015-06-25 The Travelers Indemnity Company Insurance applications utilizing virtual engineering data
US20150187011A1 (en) * 2013-12-27 2015-07-02 Syntel, Inc. Computerized system and method of evaluating insurance product underwriting and rating data
US9613102B2 (en) 2014-04-01 2017-04-04 Tableau Software, Inc. Systems and methods for ranking data visualizations
US9501211B2 (en) 2014-04-17 2016-11-22 GoDaddy Operating Company, LLC User input processing for allocation of hosting server resources
US9660933B2 (en) 2014-04-17 2017-05-23 Go Daddy Operating Company, LLC Allocating and accessing hosting server resources via continuous resource availability updates
US10692151B1 (en) * 2014-04-23 2020-06-23 State Farm Mutual Automobile Insurance Company Homeowners insurance application process using geotagged photos
US9786010B2 (en) * 2014-04-23 2017-10-10 State Farm Mutual Automobile Insurance Company Homeowners insurance application process using geotagged photos
US11756134B2 (en) 2014-04-25 2023-09-12 State Farm Mutual Automobile Insurance Company Systems and methods for homeowner-directed risk of property damage mitigation
US11966982B2 (en) 2014-04-25 2024-04-23 State Farm Mutual Automobile Insurance Company Systems and methods for automatically mitigating risk of property damage
US11042137B1 (en) 2014-04-25 2021-06-22 State Farm Mutual Automobile Insurance Company Systems and methods for managing the operation of devices within a property
US11354748B1 (en) 2014-04-25 2022-06-07 State Farm Mutual Automobile Insurance Company Systems and methods for automatically mitigating risk of water damage
US11823281B2 (en) 2014-04-25 2023-11-21 State Farm Mutual Automobile Insurance Company Systems and methods for assigning damage caused by an insurance-related event
US11361387B1 (en) 2014-04-25 2022-06-14 State Farm Mutual Automobile Insurance Company Systems and methods for managing insurance associated with devices populated within a property
US10679292B1 (en) 2014-04-25 2020-06-09 State Farm Mutual Automobile Insurance Company Systems and methods for managing insurance associated with devices populated within a property
US11379924B2 (en) 2014-04-25 2022-07-05 State Farm Mutual Automobile Insurance Company Systems and methods for automatically mitigating risk of property damage
US11074659B1 (en) 2014-04-25 2021-07-27 State Farm Mutual Automobile Insurance Company Systems and methods for community-based cause of loss determination
US10607295B1 (en) 2014-04-25 2020-03-31 State Farm Mutual Automobile Insurance Company Systems and methods for community-based cause of loss determination
US10685402B1 (en) 2014-04-25 2020-06-16 State Farm Mutual Automobile Insurance Company Systems and methods for homeowner-directed risk of property damage mitigation
US10181160B1 (en) 2014-04-25 2019-01-15 State Farm Mutual Automobile Insurance Company Systems and methods for assigning damage caused by an insurance-related event
US11657459B1 (en) 2014-04-25 2023-05-23 State Farm Mutual Automobile Insurance Company Systems and methods for predictively generating an insurance claim
US11042942B1 (en) 2014-04-25 2021-06-22 State Farm Mutual Automobile Insurance Company Systems and methods for determining cause of loss to a property
US10846800B1 (en) 2014-04-25 2020-11-24 State Farm Mutual Automobile Insurance Company Systems and methods for automatically mitigating risk of property damage
US10922756B1 (en) 2014-04-25 2021-02-16 State Farm Mutual Automobile Insurance Company Systems and methods for managing insurance for devices located within a property based on insurance-related events
US11270385B1 (en) 2014-04-25 2022-03-08 State Farm Mutual Automobile Insurance Company Systems and methods for homeowner-directed risk of property damage mitigation
US11651441B2 (en) 2014-04-25 2023-05-16 State Farm Mutual Automobile Insurance Company Systems and methods for homeowner-directed risk of property damage mitigation
US10733671B1 (en) 2014-04-25 2020-08-04 State Farm Mutual Automobile Insurance Company Systems and methods for predictively generating an insurance claim
US10282787B1 (en) * 2014-04-25 2019-05-07 State Farm Mutual Automobile Insurance Company Systems and methods for determining cause of loss to a property
US10339474B2 (en) 2014-05-06 2019-07-02 Modern Geographia, Llc Real-time carpooling coordinating system and methods
US11100434B2 (en) 2014-05-06 2021-08-24 Uber Technologies, Inc. Real-time carpooling coordinating system and methods
US11669785B2 (en) 2014-05-06 2023-06-06 Uber Technologies, Inc. System and methods for verifying that one or more directives that direct transport of a second end user does not conflict with one or more obligations to transport a first end user
US10657468B2 (en) 2014-05-06 2020-05-19 Uber Technologies, Inc. System and methods for verifying that one or more directives that direct transport of a second end user does not conflict with one or more obligations to transport a first end user
US11466993B2 (en) 2014-05-06 2022-10-11 Uber Technologies, Inc. Systems and methods for travel planning that calls for at least one transportation vehicle unit
US10458801B2 (en) 2014-05-06 2019-10-29 Uber Technologies, Inc. Systems and methods for travel planning that calls for at least one transportation vehicle unit
US11810196B1 (en) 2014-07-09 2023-11-07 Allstate Insurance Company Prioritization of insurance requotations
US10482536B1 (en) 2014-07-09 2019-11-19 Allstate Insurance Company Prioritization of insurance requotations
US11138669B1 (en) 2014-07-09 2021-10-05 Allstate Insurance Company Prioritization of insurance requotations
US20160012543A1 (en) * 2014-07-11 2016-01-14 The Travelers Indemnity Company Systems, Methods, and Apparatus for Utilizing Revenue Information in Composite-Rated Premium Determination
US12086885B1 (en) * 2014-07-22 2024-09-10 Allstate Insurance Company Generation and presentation of media to users
US11176615B1 (en) 2014-07-22 2021-11-16 Allstate Insurance Company Generation of an insurance quote based on another insurance quote
US11798098B2 (en) 2014-07-22 2023-10-24 Allstate Insurance Company Generation of an insurance quote based on another insurance quote
US11127081B1 (en) * 2014-07-22 2021-09-21 Allstate Insurance Company Generation and presentation of media to users
US9747556B2 (en) 2014-08-20 2017-08-29 Vertafore, Inc. Automated customized web portal template generation systems and methods
US11157830B2 (en) 2014-08-20 2021-10-26 Vertafore, Inc. Automated customized web portal template generation systems and methods
US20180253798A1 (en) * 2014-09-05 2018-09-06 Hartford Fire Insurance Company Segmentation Platform System
US11544792B2 (en) 2014-09-05 2023-01-03 Hartford Fire Insurance Company Segmentation and load balancing platform system
US10726497B2 (en) * 2014-09-05 2020-07-28 Hartford Fire Insurance Company Segmentation platform system
US10346811B1 (en) 2014-10-07 2019-07-09 State Farm Mutual Automobile Insurance Company Systems and methods for responding to a broken circuit
US11334040B2 (en) 2014-10-07 2022-05-17 State Farm Mutual Automobile Insurance Company Systems and methods for automatically responding to a fire
US10282788B1 (en) 2014-10-07 2019-05-07 State Farm Mutual Automobile Insurance Company Systems and methods for managing service log information
US10249158B1 (en) 2014-10-07 2019-04-02 State Farm Mutual Automobile Insurance Company Systems and methods for automatically responding to a fire
US10522009B1 (en) 2014-10-07 2019-12-31 State Farm Mutual Automobile Insurance Company Systems and methods for automatically responding to a fire
US10353359B1 (en) 2014-10-07 2019-07-16 State Farm Mutual Automobile Insurance Company Systems and methods for managing smart devices based upon electrical usage data
US10573149B1 (en) 2014-10-07 2020-02-25 State Farm Mutual Automobile Insurance Company Systems and methods for automatically generating an escape route
US10573146B1 (en) 2014-10-07 2020-02-25 State Farm Mutual Automobile Insurance Company Systems and methods for improved assisted or independent living environments
US11815864B2 (en) 2014-10-07 2023-11-14 State Farm Mutual Automobile Insurance Company Systems and methods for managing building code compliance for a property
US10282961B1 (en) 2014-10-07 2019-05-07 State Farm Mutual Automobile Insurance Company Systems and methods for automatically generating an escape route
US10515372B1 (en) 2014-10-07 2019-12-24 State Farm Mutual Automobile Insurance Company Systems and methods for managing building code compliance for a property
US11004320B1 (en) 2014-10-07 2021-05-11 State Farm Mutual Automobile Insurance Company Systems and methods for analyzing sensor data to detect property intrusion events
US10795329B1 (en) 2014-10-07 2020-10-06 State Farm Mutual Automobile Insurance Company Systems and methods for managing smart devices based upon electrical usage data
US11656585B1 (en) 2014-10-07 2023-05-23 State Farm Mutual Automobile Insurance Company Systems and methods for managing smart devices based upon electrical usage data
US10943447B1 (en) 2014-10-07 2021-03-09 State Farm Mutual Automobile Insurance Company Systems and methods for automatically responding to a fire
US11049078B1 (en) 2014-10-07 2021-06-29 State Farm Mutual Automobile Insurance Company Systems and methods for responding to a broken circuit
US11043098B1 (en) 2014-10-07 2021-06-22 State Farm Mutual Automobile Insurance Company Systems and methods for automatically generating an escape route
US11423754B1 (en) 2014-10-07 2022-08-23 State Farm Mutual Automobile Insurance Company Systems and methods for improved assisted or independent living environments
US20160189173A1 (en) * 2014-12-30 2016-06-30 The Nielsen Company (Us), Llc Methods and apparatus to predict attitudes of consumers
WO2016123042A1 (fr) * 2015-01-26 2016-08-04 Dragonfly Data Factory Llc Plateforme d'usine de données et système d'exploitation
US11900469B2 (en) 2015-02-03 2024-02-13 State Farm Mutual Automobile Insurance Company Point-of-service tool for entering claim information
US9928144B2 (en) 2015-03-30 2018-03-27 Commvault Systems, Inc. Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage
US11500730B2 (en) 2015-03-30 2022-11-15 Commvault Systems, Inc. Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage
US10733058B2 (en) 2015-03-30 2020-08-04 Commvault Systems, Inc. Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage
US20160321744A1 (en) * 2015-03-31 2016-11-03 Venminder, Inc. Systems and methods for automated management of contracts between financial institutions and vendors, automated preparation of examination reports, and automated management of examination reports
US11226856B2 (en) * 2015-04-24 2022-01-18 Senslytics Corporation Methods and systems correlating hypotheses outcomes using relevance scoring for intuition based forewarning
US20220138031A1 (en) * 2015-04-24 2022-05-05 Senslytics Corporation Auto-hypotheses iteration to converge into situation-specific scientific causation using intuition technology framework
US20190087247A1 (en) * 2015-04-24 2019-03-21 Senslytics Corporation Methods and systems correlating hypotheses outcomes using relevance scoring for intuition based forewarning
US10147141B1 (en) * 2015-06-22 2018-12-04 Insurance Technologies Corporation Systems and methods for intelligent configuration of a dynamic interface
US10497059B1 (en) 2015-07-04 2019-12-03 Enerknol, Inc. Method and system for providing real time access to relevant energy policy and regulatory data
US20170010926A1 (en) * 2015-07-06 2017-01-12 Microsoft Technology Licensing, Llc Extensibility of engines in computing systems
US9753788B2 (en) * 2015-07-06 2017-09-05 Microsoft Technology Licensing, Llc Extensibility of engines in computing systems
US20200401632A1 (en) * 2015-07-31 2020-12-24 Netapp Inc. Extensible and elastic data management services engine external to a storage domain
US11709897B2 (en) * 2015-07-31 2023-07-25 Netapp, Inc. Extensible and elastic data management services engine external to a storage domain
US11232160B2 (en) * 2015-07-31 2022-01-25 Netapp, Inc. Extensible and elastic data management services engine external to a storage domain
US20240126820A1 (en) * 2015-07-31 2024-04-18 Netapp Inc. Extensible and elastic data management services engine external to a storage domain
US10769212B2 (en) * 2015-07-31 2020-09-08 Netapp Inc. Extensible and elastic data management services engine external to a storage domain
US9990308B2 (en) 2015-08-31 2018-06-05 Oracle International Corporation Selective data compression for in-memory databases
US10331572B2 (en) 2015-08-31 2019-06-25 Oracle International Corporation Selective data mirroring for in-memory databases
US11157171B2 (en) 2015-09-02 2021-10-26 Commvault Systems, Inc. Migrating data to disk without interrupting running operations
US10318157B2 (en) 2015-09-02 2019-06-11 Commvault Systems, Inc. Migrating data to disk without interrupting running operations
US10101913B2 (en) 2015-09-02 2018-10-16 Commvault Systems, Inc. Migrating data to disk without interrupting running backup operations
US10747436B2 (en) 2015-09-02 2020-08-18 Commvault Systems, Inc. Migrating data to disk without interrupting running operations
CN107026888A (zh) * 2015-10-05 2017-08-08 株式会社突飞软件 大容量数据传送装置及方法
US10991052B2 (en) * 2015-10-06 2021-04-27 Hartford Fire Insurance Company System for multi-platform data processing
US20210350473A1 (en) * 2015-10-06 2021-11-11 Hartford Fire Insurance Company Multi-platform data processing system
US11669910B2 (en) * 2015-10-06 2023-06-06 Hartford Fire Insurance Company Multi-platform data processing system
US10650461B2 (en) * 2015-10-06 2020-05-12 Hartford Fire Insurance Company System for improved network data processing
US9600400B1 (en) 2015-10-29 2017-03-21 Vertafore, Inc. Performance testing of web application components using image differentiation
US20170124661A1 (en) * 2015-11-01 2017-05-04 Bolt Solutions Inc. Book exchange process
US10437796B2 (en) 2015-11-17 2019-10-08 International Business Machines Coporation Schema lifecycle manager
US9535934B1 (en) * 2015-11-17 2017-01-03 International Business Machines Corporation Schema lifecycle manager
US10515716B2 (en) * 2015-11-18 2019-12-24 Agatha Inc. Clinical research information cloud service system and clinical research information cloud service method
USD800761S1 (en) * 2016-01-22 2017-10-24 Google Inc. Portion of a display screen with a changeable graphical user interface component
USD800153S1 (en) * 2016-01-22 2017-10-17 Google Inc. Portion of a display screen with a changeable graphical user interface component
US10504065B2 (en) * 2016-02-02 2019-12-10 Successfactors, Inc. Modeling utilizing staging entity joined with compensation formula table
US20170221002A1 (en) * 2016-02-02 2017-08-03 Successfactors, Inc. Modeling Utilizing Staging Entity
US10706474B2 (en) 2016-04-25 2020-07-07 Hartford Fire Insurance Company Supplemental review process determination utilizing advanced analytics decision making model
US11209553B2 (en) 2016-05-24 2021-12-28 Flex Ltd. Systems and methods for active supply chain monitoring
US10482035B1 (en) * 2016-06-07 2019-11-19 Jpmorgan Chase Bank, N.A. Standard address key system and method
US10783575B1 (en) 2016-07-01 2020-09-22 Apttus Corporation System, method, and computer program for deploying a prepackaged analytic intelligence module for a quote-to-cash application while protecting the privacy of customer data
WO2018039321A1 (fr) * 2016-08-24 2018-03-01 Allstate Insurance Company Système et réseau d'optimisation à plusieurs niveaux
US11928736B2 (en) * 2016-08-24 2024-03-12 Allstate Insurance Company System and network for tiered optimization
US20180060969A1 (en) * 2016-08-24 2018-03-01 Allstate Insurance Company System And Network For Tiered Optimization
US10621640B2 (en) 2016-10-03 2020-04-14 Apttus Corporation Augmented and virtual reality quote-to-cash system
US11720951B2 (en) 2017-04-11 2023-08-08 Apttus Corporation Quote-to-cash intelligent software agent
US11232508B2 (en) 2017-04-11 2022-01-25 Apttus Corporation Quote-to-cash intelligent software agent
US10241963B2 (en) * 2017-05-19 2019-03-26 The United States Of America, As Represented By The Secretary Of The Navy Hash-based synchronization of geospatial vector features
US20180349324A1 (en) * 2017-06-06 2018-12-06 Apttus Corporation Real-time and computationally efficent prediction of values for a quote variable in a pricing application
US10521491B2 (en) * 2017-06-06 2019-12-31 Apttus Corporation Real-time and computationally efficient prediction of values for a quote variable in a pricing application
US11455373B2 (en) 2017-06-06 2022-09-27 Apttus Corporation Real-time and computationally efficient prediction of values for a quote variable in a pricing application
US11218834B2 (en) 2017-07-31 2022-01-04 Snap Inc. System to track visitation metrics
US11864053B2 (en) 2017-07-31 2024-01-02 Snap Inc. System to track visitation metrics
US10735890B1 (en) * 2017-07-31 2020-08-04 Snap Inc. System to track visitation metrics
US20190043134A1 (en) * 2017-08-02 2019-02-07 Matthew R. White System and method of quoting aviation insurance from multiple insurance vendors
US20190164094A1 (en) * 2017-11-27 2019-05-30 Promontory Financial Group Llc Risk rating analytics based on geographic regions
US12003581B2 (en) 2017-12-12 2024-06-04 Commvault Systems, Inc. Enhanced network attached storage (NAS) interoperating with and overflowing to cloud storage resources
US10742735B2 (en) 2017-12-12 2020-08-11 Commvault Systems, Inc. Enhanced network attached storage (NAS) services interfacing to cloud storage
US11575747B2 (en) 2017-12-12 2023-02-07 Commvault Systems, Inc. Enhanced network attached storage (NAS) services interfacing to cloud storage
US11423758B2 (en) 2018-04-09 2022-08-23 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11869328B2 (en) 2018-04-09 2024-01-09 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11887461B2 (en) 2018-04-09 2024-01-30 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11462094B2 (en) 2018-04-09 2022-10-04 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11670153B2 (en) 2018-04-09 2023-06-06 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US20200349648A1 (en) * 2018-05-21 2020-11-05 Great-West Life & Annuity Insurance Company Planning engine for a financial planning system
US11748814B2 (en) * 2018-05-21 2023-09-05 Empower Annuity Insurance Company Of America Planning engine for a financial planning system
US11720956B2 (en) * 2018-05-21 2023-08-08 Empower Annuity Insurance Company Of America Integrated graphical user interface for separate service levels of a financial planning system
CN109446281A (zh) * 2018-09-05 2019-03-08 广州市城市规划勘测设计研究院 基于ArcGIS的在线智能制图系统构建方法、系统与制图方法
US11037249B2 (en) 2018-10-25 2021-06-15 Hartford Fire Insurance Company Document creation system and method utilizing optional component documents
CN109615263A (zh) * 2018-12-25 2019-04-12 中国矿业大学(北京) 一种社会风险信息采集处理系统及方法
US20200334598A1 (en) * 2019-04-17 2020-10-22 Danah L. Prignano Automated summary system computer server associated with a risk relationship attribute value review
US20200401585A1 (en) * 2019-05-31 2020-12-24 Teradata Us, Inc. Spatial joins in multi-processing computing systems including massively parallel processing database systems
CN110458715A (zh) * 2019-07-05 2019-11-15 中国平安财产保险股份有限公司 风险评分方法、装置及计算机可读存储介质
US11188853B2 (en) * 2019-09-30 2021-11-30 The Travelers Indemnity Company Systems and methods for artificial intelligence (AI) damage triage and dynamic resource allocation, routing, and scheduling
US11531690B1 (en) * 2019-10-11 2022-12-20 Nationwide Mutual Insurance Co. Geospatial visualization and query tool
WO2021091954A1 (fr) * 2019-11-04 2021-05-14 Neptune Flood Incorporated Sélection, évaluation, désagrégation et affectation de risque
US12135720B2 (en) * 2019-12-18 2024-11-05 Teradata Us, Inc. Spatial joins in multi-processing computing systems including massively parallel processing database systems
US11615089B1 (en) 2020-02-04 2023-03-28 Apttus Corporation System, method, and computer program for converting a natural language query to a structured database query
US11550786B1 (en) 2020-02-04 2023-01-10 Apttus Corporation System, method, and computer program for converting a natural language query to a structured database update statement
US11615080B1 (en) 2020-04-03 2023-03-28 Apttus Corporation System, method, and computer program for converting a natural language query to a nested database query
US11301456B2 (en) * 2020-05-07 2022-04-12 Sap Se Processing consistency validations of conditional foreign-key relations
WO2022015949A1 (fr) * 2020-07-16 2022-01-20 Allstate Insurance Company Profilage de système dynamique basé sur l'extraction de données
US11531765B2 (en) 2020-07-16 2022-12-20 Allstate Insurance Company Dynamic system profiling based on data extraction
US12067128B2 (en) 2020-07-16 2024-08-20 Allstate Insurance Company Dynamic system profiling based on data extraction
US11494058B1 (en) * 2020-09-03 2022-11-08 George Damian Interactive methods and systems for exploring ideology attributes on a virtual map
CN112329083A (zh) * 2020-11-06 2021-02-05 大唐环境产业集团股份有限公司 一种烟风道结构智能设计系统的智能建模和方法
US11416291B1 (en) * 2021-07-08 2022-08-16 metacluster lt, UAB Database server management for proxy scraping jobs
US12014387B1 (en) 2021-07-23 2024-06-18 Apttus Corporation System, method, and computer program for providing a pricing platform for performing different types of pricing calculations for different customers
US11593223B1 (en) 2021-09-02 2023-02-28 Commvault Systems, Inc. Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants
US11928031B2 (en) 2021-09-02 2024-03-12 Commvault Systems, Inc. Using resource pool administrative entities to provide shared infrastructure to tenants
USD1043727S1 (en) 2021-09-20 2024-09-24 Empower Annuity Insurance Company Of America Display screen or portion thereof with graphical user interface
US12067037B1 (en) 2022-02-28 2024-08-20 Apttus Corporation System, method, and computer program for performing natural language searches for documents in a database using alternate search suggestions

Also Published As

Publication number Publication date
WO2004059538A3 (fr) 2004-12-02
WO2004059420A3 (fr) 2004-12-23
CA2510111A1 (fr) 2004-07-15
WO2004059420A2 (fr) 2004-07-15
EP1573598A2 (fr) 2005-09-14
AU2003297152A8 (en) 2004-07-22
AU2003300950A1 (en) 2004-07-22
CA2510108A1 (fr) 2004-07-15
AU2003297152A1 (en) 2004-07-22
EP1573598A4 (fr) 2006-07-26
WO2004059538A2 (fr) 2004-07-15
AU2003300950A8 (en) 2004-07-22
EP1573597A2 (fr) 2005-09-14

Similar Documents

Publication Publication Date Title
US20060100912A1 (en) Real-time insurance policy underwriting and risk management
US9646284B1 (en) Global inventory warehouse
US10073979B2 (en) Method, system, and program for an improved enterprise spatial system
US10152687B2 (en) Application directory
US7536405B2 (en) Risk management information interface system and associated methods
US6633875B2 (en) Computer database system and method for collecting and reporting real estate property and loan performance information over a computer driven network
US10482535B1 (en) Impact data manager for generating dynamic intelligence cubes
US20040168086A1 (en) Interactive security risk management
US20090070237A1 (en) Data reconciliation
WO2003050656A2 (fr) Procede et systeme fonde sur des regles destines a la surveillance des performances de projet
EP1839205A2 (fr) Systeme et procede de gestion de politique a l'echelle de l'entreprise
EP1849106A2 (fr) Systeme et procede permettant de maintenir la continuite d'operations
Bhowmick et al. Ibm intelligent operations center for smarter cities administration guide
Snyder et al. Situational awareness enhanced through social media analytics: A survey of first responders
CA2479375A1 (fr) Procede, systeme et logiciel pour un systeme spatial ameliore d'entreprise
National Research Council et al. Summary of a workshop on information technology research for crisis management
Tantua Data Protection and Informa Tertiary Institut
Arundhati et al. Ibm intelligent operations center for smarter cities administration guide
Test Surviving a catastrophe: An experiment of a regionally geographically diverse clustered database network architecture
Bhattacharya et al. Architecture of IT Enabled Disaster Management System fo r Governments
JULY FREESE, MARK, R, CAPT, USPHS, DENT

Legal Events

Date Code Title Description
AS Assignment

Owner name: QUESTERRA CORPORATION, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KUMAR, C. SURESH;DYRNAES, DAVID NEIL;VON KAENEL, TIM A.;AND OTHERS;REEL/FRAME:017499/0118

Effective date: 20040311

Owner name: QUESTERRA LLC, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KUMAR, C. SURESH;DYRNAES, DAVID NEIL;VON KAENEL, TIM A.;AND OTHERS;REEL/FRAME:017499/0037;SIGNING DATES FROM 20040423 TO 20040528

AS Assignment

Owner name: THE PARADIGM ALLIANCE, INC., KANSAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:QUESTERRA LLC;REEL/FRAME:020327/0564

Effective date: 20071016

AS Assignment

Owner name: QUESTERRA LLC, CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:QUESTERRA CORP.;REEL/FRAME:022470/0047

Effective date: 20021231

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCV Information on status: appeal procedure

Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER

STCV Information on status: appeal procedure

Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED

STCV Information on status: appeal procedure

Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION